ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.06141
28
10

Strong Hardness of Privacy from Weak Traitor Tracing

20 July 2016
Lucas Kowalczyk
T. Malkin
Jonathan R. Ullman
Mark Zhandry
ArXivPDFHTML
Abstract

Despite much study, the computational complexity of differential privacy remains poorly understood. In this paper we consider the computational complexity of accurately answering a family QQQ of statistical queries over a data universe XXX under differential privacy. A statistical query on a dataset D∈XnD \in X^nD∈Xn asks "what fraction of the elements of DDD satisfy a given predicate ppp on XXX?" Dwork et al. (STOC'09) and Boneh and Zhandry (CRYPTO'14) showed that if both QQQ and XXX are of polynomial size, then there is an efficient differentially private algorithm that accurately answers all the queries, and if both QQQ and XXX are exponential size, then under a plausible assumption, no efficient algorithm exists. We show that, under the same assumption, if either the number of queries or the data universe is of exponential size, and the other has size at least O~(n7)\tilde{O}(n^7)O~(n7), then there is no differentially private algorithm that answers all the queries. In both cases, the result is nearly quantitatively tight, since there is an efficient differentially private algorithm that answers Ω~(n2)\tilde{\Omega}(n^2)Ω~(n2) queries on an exponential size data universe, and one that answers exponentially many queries on a data universe of size Ω~(n2)\tilde{\Omega}(n^2)Ω~(n2). Our proofs build on the connection between hardness results in differential privacy and traitor-tracing schemes (Dwork et al., STOC'09; Ullman, STOC'13). We prove our hardness result for a polynomial size query set (resp., data universe) by showing that they follow from the existence of a special type of traitor-tracing scheme with very short ciphertexts (resp., secret keys), but very weak security guarantees, and then constructing such a scheme.

View on arXiv
Comments on this paper