论文标题
在洗牌模型的圆形复杂性上
On the Round Complexity of the Shuffle Model
论文作者
论文摘要
提出了差异隐私模型作为执行分布式不同私有计算的可行模型。非正式地,该模型由一个不受信任的分析仪组成,该分析仪通过混乱功能接收由参与方发送的消息,后者可能会使消息与发件人隔离。先前的工作重点是一轮私人洗牌模型协议,证明可以在此模型中执行诸如添加和直方图之类的功能,其精度级别类似于差异隐私模型的功能,其中计算由完全受信任的方执行。 为了关注洗牌模型的圆形复杂性,我们在这项工作中询问了两轮差异隐私模型中可以计算的。 Ishai等。 [FOCS 2006]展示了如何使用一轮随机套件在每两方之间建立秘密钥匙。使用此原始模拟一般安全的多方协议将其圆形复杂性提高了一个。我们展示了两个方如何使用一轮随机来发送秘密消息而无需首先建立秘密钥匙,从而保持圆形复杂性。将此原始性与Applebaun等人的两轮半达饭协议相结合。 [TCC 2018],我们获得的是,每个随机功能都可以在诚实多数的洗牌模型中计算,仅在两轮比赛中。这包括任何差异化计算。然后,我们采取行动检查(i)不需要诚实多数的假设,或者(ii)也不承认单轮协议,即使以诚实的多数席位,也不需要私人计算。为此,我们介绍了两个计算任务:通用元素问题和嵌套通讯元素问题,为此我们显示了一轮和两轮协议之间的分离。
The shuffle model of differential privacy was proposed as a viable model for performing distributed differentially private computations. Informally, the model consists of an untrusted analyzer that receives messages sent by participating parties via a shuffle functionality, the latter potentially disassociates messages from their senders. Prior work focused on one-round differentially private shuffle model protocols, demonstrating that functionalities such as addition and histograms can be performed in this model with accuracy levels similar to that of the curator model of differential privacy, where the computation is performed by a fully trusted party. Focusing on the round complexity of the shuffle model, we ask in this work what can be computed in the shuffle model of differential privacy with two rounds. Ishai et al. [FOCS 2006] showed how to use one round of the shuffle to establish secret keys between every two parties. Using this primitive to simulate a general secure multi-party protocol increases its round complexity by one. We show how two parties can use one round of the shuffle to send secret messages without having to first establish a secret key, hence retaining round complexity. Combining this primitive with the two-round semi-honest protocol of Applebaun et al. [TCC 2018], we obtain that every randomized functionality can be computed in the shuffle model with an honest majority, in merely two rounds. This includes any differentially private computation. We then move to examine differentially private computations in the shuffle model that (i) do not require the assumption of an honest majority, or (ii) do not admit one-round protocols, even with an honest majority. For that, we introduce two computational tasks: the common-element problem and the nested-common-element problem, for which we show separations between one-round and two-round protocols.