TY - GEN
T1 - Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
AU - Eriguchi, Reo
AU - Ichikawa, Atsunori
AU - Kunihiro, Noboru
AU - Nuida, Koji
N1 - Publisher Copyright:
© 2021, International Financial Cryptography Association.
PY - 2021
Y1 - 2021
N2 - This paper studies the problem of constructing secure multiparty computation protocols whose outputs satisfy differential privacy. We first provide a general framework for multiparty protocols generating shares of noise drawn from distributions capable of achieving differential privacy. Then, using this framework, we propose two kinds of protocols based on secret sharing. The first one is a constant-round protocol which enables parties to jointly generate shares of noise drawn from the discrete Laplace distribution. This protocol always outputs shares of noise while the previously known protocol fails with non-zero probability. The second protocol allows the parties to non-interactively obtain shares of noise following the binomial distribution by predistributing keys for pseudorandom functions in the setup phase. As a result, the parties can compute a share of noise enough to provide the computational analogue of ϵ -differential privacy with communication complexity independent of ϵ. It is much more efficient than the previous protocols which require communication complexity proportional to ϵ- 2 to achieve (information-theoretic) (ϵ, δ) -differential privacy for some δ> 0.
AB - This paper studies the problem of constructing secure multiparty computation protocols whose outputs satisfy differential privacy. We first provide a general framework for multiparty protocols generating shares of noise drawn from distributions capable of achieving differential privacy. Then, using this framework, we propose two kinds of protocols based on secret sharing. The first one is a constant-round protocol which enables parties to jointly generate shares of noise drawn from the discrete Laplace distribution. This protocol always outputs shares of noise while the previously known protocol fails with non-zero probability. The second protocol allows the parties to non-interactively obtain shares of noise following the binomial distribution by predistributing keys for pseudorandom functions in the setup phase. As a result, the parties can compute a share of noise enough to provide the computational analogue of ϵ -differential privacy with communication complexity independent of ϵ. It is much more efficient than the previous protocols which require communication complexity proportional to ϵ- 2 to achieve (information-theoretic) (ϵ, δ) -differential privacy for some δ> 0.
UR - http://www.scopus.com/inward/record.url?scp=85118944665&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85118944665&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-64322-8_13
DO - 10.1007/978-3-662-64322-8_13
M3 - Conference contribution
AN - SCOPUS:85118944665
SN - 9783662643211
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 271
EP - 290
BT - Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers
A2 - Borisov, Nikita
A2 - Diaz, Claudia
PB - Springer Science and Business Media Deutschland GmbH
T2 - 25th International Conference on Financial Cryptography and Data Security, FC 2021
Y2 - 1 March 2021 through 5 March 2021
ER -