Consider a PPT two-party protocol in which the parties get no private inputs and obtain outputs , and let and denote the parties' individual views. Protocol has -agreement if . The leakage of is the amount of information a party obtains about the event ; that is, the leakage is the maximum, over , of the distance between and . Typically, this distance is measured in statistical distance, or, in the computational setting, in computational indistinguishability. For this choice, Wullschleger [TCC 09] showed that if then the protocol can be transformed into an OT protocol. We consider measuring the protocol leakage by the log-ratio distance (which was popularized by its use in the differential privacy framework). The log-ratio distance between X,Y over domain \Omega is the minimal for which, for every , . In the computational setting, we use computational indistinguishability from having log-ratio distance . We show that a protocol with (noticeable) accuracy can be transformed into an OT protocol (note that this allows ). We complete the picture, in this respect, showing that a protocol with does not necessarily imply OT. Our results hold for both the information theoretic and the computational settings, and can be viewed as a "fine grained" approach to "weak OT amplification". We then use the above result to fully characterize the complexity of differentially private two-party computation for the XOR function, answering the open question put by Goyal, Khurana, Mironov, Pandey, and Sahai [ICALP 16] and Haitner, Nissim, Omri, Shaltiel, and Silbak [FOCS 18].
View on arXiv