ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2105.00770
20
11

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

3 May 2021
Iftach Haitner
N. Mazor
Ronen Shaltiel
Jad Silbak
    FedML
ArXivPDFHTML
Abstract

Consider a PPT two-party protocol π=(A,B)\pi=(A,B)π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}O^A,O^B\in \{0,1\}OA,OB∈{0,1}, and let VAV^AVA and VBV^BVB denote the parties' individual views. Protocol π\piπ has α\alphaα-agreement if Pr[OA=OB]=1/2+αPr[O^A=O^B]=1/2+\alphaPr[OA=OB]=1/2+α. The leakage of π\piπ is the amount of information a party obtains about the event {OA=OB}\{O^A=O^B\}{OA=OB}; that is, the leakage ϵ\epsilonϵ is the maximum, over P∈{A,B}P\in\{A,B\}P∈{A,B}, of the distance between VP∣OA=OBV^P|OA=OBVP∣OA=OB and VP∣OA≠OBV^P|OA\neq OBVP∣OA=OB. Typically, this distance is measured in statistical distance, or, in the computational setting, in computational indistinguishability. For this choice, Wullschleger [TCC 09] showed that if α>>ϵ\alpha>>\epsilonα>>ϵ then the protocol can be transformed into an OT protocol. We consider measuring the protocol leakage by the log-ratio distance (which was popularized by its use in the differential privacy framework). The log-ratio distance between X,Y over domain \Omega is the minimal ϵ>0\epsilon>0ϵ>0 for which, for every v∈Ωv\in\Omegav∈Ω, log(Pr[X=v]/Pr[Y=v])∈[−ϵ,ϵ]log(Pr[X=v]/Pr[Y=v])\in [-\epsilon,\epsilon]log(Pr[X=v]/Pr[Y=v])∈[−ϵ,ϵ]. In the computational setting, we use computational indistinguishability from having log-ratio distance ϵ\epsilonϵ. We show that a protocol with (noticeable) accuracy α∈Ω(ϵ2)\alpha\in\Omega(\epsilon^2)α∈Ω(ϵ2) can be transformed into an OT protocol (note that this allows ϵ>>α\epsilon>>\alphaϵ>>α). We complete the picture, in this respect, showing that a protocol with α∈o(ϵ2)\alpha\in o(\epsilon^2)α∈o(ϵ2) does not necessarily imply OT. Our results hold for both the information theoretic and the computational settings, and can be viewed as a "fine grained" approach to "weak OT amplification". We then use the above result to fully characterize the complexity of differentially private two-party computation for the XOR function, answering the open question put by Goyal, Khurana, Mironov, Pandey, and Sahai [ICALP 16] and Haitner, Nissim, Omri, Shaltiel, and Silbak [FOCS 18].

View on arXiv
Comments on this paper