Skip to main content

On Communication Protocols That Compute Almost Privately

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6982))

Abstract

A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approximate privacy model for two-party communication recently introduced by Feigenbaum et al. [8]. We explore the privacy properties of a natural class of communication protocols that we refer to as “dissection protocols”. Dissection protocols include, among others, the bisection auction in [9,10] and the bisection protocol for the millionaires problem in [8]. Informally, in a dissection protocol the communicating parties are restricted to answering simple questions of the form “Is your input between the values α and β (under a pre-defined order over the possible inputs)?”.

We prove that for a large class of functions called tiling functions, which include the 2nd-price Vickrey auction, there always exists a dissection protocol that provides a constant average-case privacy approximation ratio for uniform or “almost uniform” probability distributions over inputs. To establish this result we present an interesting connection between the approximate privacy framework and basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not, in general, exist in the worst case. We also discuss extensions of the basic setup to more than two parties and to non-tiling functions, and provide calculations of privacy approximation ratios for two functions of interest.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: 41st ACM Symp. on Theory of Computing, pp. 351–360 (2009)

    Google Scholar 

  2. Berman, P., DasGupta, B., Muthukrishnan, S.: On the Exact Size of the Binary Space Partitioning of Sets of Isothetic Rectangles with Applications. SIAM Journal of Discrete Mathematics 15(2), 252–267 (2002)

    Article  MATH  Google Scholar 

  3. Bar-Yehuda, R., Chor, B., Kushilevitz, E., Orlitsky, A.: Privacy, additional information, and communication. IEEE Trans. on Inform. Theory 39, 55–65 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  4. d’Amore, F., Franciosa, P.G.: On the optimal binary plane partition for sets of isothetic rectangles. Information Processing Letters 44, 255–259 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  5. Chaum, D., Crépeau, C., Damgaard, I.: Multiparty, unconditionally secure protocols. In: 22th ACM Symposium on Theory of Computing, pp. 11–19 (1988)

    Google Scholar 

  6. Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy. SIAM Journal of Discrete Mathematics 4, 36–47 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  7. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Feigenbaum, J., Jaggard, A., Schapira, M.: Approximate Privacy: Foundations and Quantification. In: ACM Conference on Electronic Commerce, pp. 167–178 (2010)

    Google Scholar 

  9. Grigorievaa, E., Heringsb, P.J.-J., Müllera, R., Vermeulena, D.: The communication complexity of private value single-item auctions. Operations Research Letters 34, 491–498 (2006)

    Article  MathSciNet  Google Scholar 

  10. Grigorievaa, E., Heringsb, P.J.-J., Müllera, R., Vermeulena, D.: The private value single item bisection auction. Economic Theory 30, 107–118 (2007)

    Article  MathSciNet  Google Scholar 

  11. Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, Cambridge (1997)

    Book  MATH  Google Scholar 

  12. Kifer, D., Lin, B.-R.: An Axiomatic View of Statistical Privacy and Utility. Journal of Privacy and Confidentiality (to appear)

    Google Scholar 

  13. Kushilevitz, E.: Privacy and communication complexity. SIAM Journal of Discrete Mathematics 5(2), 273–284 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  14. Paterson, M., Yao, F.F.: Efficient binary space partitions for hidden-surface removal and solid modeling. Discrete & Computational Geometry 5(1), 485–503 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  15. Paterson, M., Yao, F.F.: Optimal binary space partitions for orthogonal objects. Journal of Algorithms 13, 99–113 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  16. Yao, A.C.: Some complexity questions related to distributive computing. In: 11th ACM Symposium on Theory of Computing, pp. 209–213 (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Comi, M., DasGupta, B., Schapira, M., Srinivasan, V. (2011). On Communication Protocols That Compute Almost Privately. In: Persiano, G. (eds) Algorithmic Game Theory. SAGT 2011. Lecture Notes in Computer Science, vol 6982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24829-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24829-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24828-3

  • Online ISBN: 978-3-642-24829-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics