论文标题

DP-Cryptography:在新兴应用中嫁给差异隐私和密码学

DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications

论文作者

Wagh, Sameer, He, Xi, Machanavajjhala, Ashwin, Mittal, Prateek

论文摘要

在分析敏感数据时,已经出现了差异隐私(DP)作为量化个人隐私的最新指标,并且开始在美国人口普查局,苹果,Google,Google等组织中看到实际部署。 (LDP),每个用户都会分析自己的数据和扰动数据。由于在单个服务器上汇总了原始数据引起的安全问题,行业中的几个现实世界部署都采用了自然界生物自然党模型。但是,与基于SDP模型相比,基于LDP模型的系统往往具有较差的效用 - 实用程序中实现的“差距”。 在这项工作中,我们在差异隐私和密码学的交集中调查并综合了新兴的研究方向。首先,我们调查了将加密原始图和匿名通信与差异隐私相结合的解决方案,以替代LDP模型的替代方法,该模型避免了可信赖的服务器,如SDP中,但要缩小准确性的差距。这些原语会引入性能瓶颈,并需要有效的替代方案。其次,我们在称为“ DP -Cryptography”的领域合成工作 - 允许泄漏私人输出泄漏的加密原始图。这些原语的性能比标准的加密原语具有更好的数量级。 DP-Cryptography原始图非常适合实施最不发达国家的替代方案,但也适用于标准加密原始图没有实际实现的场景。通过这种独特的研究分类学镜头,我们调查了这些方向正在进行的研究,同时还为未来的研究提供了新的方向。

Differential privacy (DP) has arisen as the state-of-the-art metric for quantifying individual privacy when sensitive data are analyzed, and it is starting to see practical deployment in organizations such as the US Census Bureau, Apple, Google, etc. There are two popular models for deploying differential privacy - standard differential privacy (SDP), where a trusted server aggregates all the data and runs the DP mechanisms, and local differential privacy (LDP), where each user perturbs their own data and perturbed data is analyzed. Due to security concerns arising from aggregating raw data at a single server, several real world deployments in industry have embraced the LDP model. However, systems based on the LDP model tend to have poor utility - "a gap" in the utility achieved as compared to systems based on the SDP model. In this work, we survey and synthesize emerging directions of research at the intersection of differential privacy and cryptography. First, we survey solutions that combine cryptographic primitives like secure computation and anonymous communication with differential privacy to give alternatives to the LDP model that avoid a trusted server as in SDP but close the gap in accuracy. These primitives introduce performance bottlenecks and necessitate efficient alternatives. Second, we synthesize work in an area we call "DP-Cryptography" - cryptographic primitives that are allowed to leak differentially private outputs. These primitives have orders of magnitude better performance than standard cryptographic primitives. DP-cryptographic primitives are perfectly suited for implementing alternatives to LDP, but are also applicable to scenarios where standard cryptographic primitives do not have practical implementations. Through this unique lens of research taxonomy, we survey ongoing research in these directions while also providing novel directions for future research.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源