Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols

  • Vipul Goyal
  • Ilya Mironov
  • Omkant Pandey
  • Amit Sahai
Conference paper

DOI: 10.1007/978-3-642-40041-4_17

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8042)
Cite this paper as:
Goyal V., Mironov I., Pandey O., Sahai A. (2013) Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols. In: Canetti R., Garay J.A. (eds) Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science, vol 8042. Springer, Berlin, Heidelberg

Abstract

Differential privacy (DP) is a well-studied notion of privacy that is generally achieved by randomizing outputs to preserve the privacy of the input records. A central problem in differential privacy is how much accuracy must be lost in order to preserve input privacy?

Our work obtains general upper bounds on accuracy for differentially private two-party protocols computing any Boolean function. Our bounds are independent of the number of rounds and the communication complexity of the protocol, and hold with respect to computationally unbounded parties. At the heart of our results is a new general geometric technique for obtaining non-trivial accuracy bounds for any Boolean functionality.

We show that for any Boolean function, there is a constant accuracy gap between the accuracy that is possible in the client-server setting and the accuracy that is possible in the two-party setting. In particular, we show tight results on the accuracy that is achievable for the AND and XOR functions in the two-party setting, completely characterizing which accuracies are achievable for any given level of differential privacy.

Finally, we consider the situation if we relax the privacy requirement to computational differential privacy. We show that to achieve any noticeably better accuracy than what is possible for differentially private two-party protocols, it is essential that one-way functions exist.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© International Association for Cryptologic Research 2013

Authors and Affiliations

  • Vipul Goyal
    • 1
  • Ilya Mironov
    • 2
  • Omkant Pandey
    • 3
  • Amit Sahai
    • 4
  1. 1.Microsoft Research IndiaIndia
  2. 2.Microsoft Research Silicon ValleyUSA
  3. 3.The University of Texas at AustinUSA
  4. 4.University of California Los AngelesUSA

Personalised recommendations