TY - GEN
T1 - Do distributed differentially-private protocols require oblivious transfer?
AU - Goyal, Vipul
AU - Khurana, Dakshita
AU - Mironov, Ilya
AU - Pandey, Omkant
AU - Sahai, Amit
PY - 2016/8/1
Y1 - 2016/8/1
N2 - We study the cryptographic complexity of two-party differentially-private protocols for a large natural class of boolean functionalities. Information theoretically, McGregor et al. [FOCS 2010] and Goyal et al. [Crypto 2013] demonstrated several functionalities for which the maximal possible accuracy in the distributed setting is significantly lower than that in the client-server setting. Goyal et al. [Crypto 2013] further showed that "highly accurate" protocols in the distributed setting for any non-trivial functionality in fact imply the existence of one-way functions. However, it has remained an open problem to characterize the exact cryptographic complexity of this class. In particular, we know that semi-honest oblivious transfer helps obtain optimally accurate distributed differential privacy. But we do not know whether the reverse is true. We study the following question: Does the existence of optimally accurate distributed differentially private protocols for any class of functionalities imply the existence of oblivious transfer (or equivalently secure multi-party computation)? We resolve this question in the affirmative for the class of boolean functionalities that contain an XOR embedded on adjacent inputs. We give a reduction from oblivious transfer to: Any distributed optimally accurate ϵ-differentially private protocol with ϵ > 0 computing a functionality with a boolean XOR embedded on adjacent inputs. Any distributed non-optimally accurate ϵ-differentially private protocol with ϵ > 0, for a constant range of non-optimal accuracies and constant range of values of ϵ, computing a functionality with a boolean XOR embedded on adjacent inputs. Enroute to proving these results, we demonstrate a connection between optimally-accurate twoparty differentially-private protocols for functions with a boolean XOR embedded on adjacent inputs, and noisy channels, which were shown by Crépeau and Kilian [FOCS 1988] to be sufficient for oblivious transfer.
AB - We study the cryptographic complexity of two-party differentially-private protocols for a large natural class of boolean functionalities. Information theoretically, McGregor et al. [FOCS 2010] and Goyal et al. [Crypto 2013] demonstrated several functionalities for which the maximal possible accuracy in the distributed setting is significantly lower than that in the client-server setting. Goyal et al. [Crypto 2013] further showed that "highly accurate" protocols in the distributed setting for any non-trivial functionality in fact imply the existence of one-way functions. However, it has remained an open problem to characterize the exact cryptographic complexity of this class. In particular, we know that semi-honest oblivious transfer helps obtain optimally accurate distributed differential privacy. But we do not know whether the reverse is true. We study the following question: Does the existence of optimally accurate distributed differentially private protocols for any class of functionalities imply the existence of oblivious transfer (or equivalently secure multi-party computation)? We resolve this question in the affirmative for the class of boolean functionalities that contain an XOR embedded on adjacent inputs. We give a reduction from oblivious transfer to: Any distributed optimally accurate ϵ-differentially private protocol with ϵ > 0 computing a functionality with a boolean XOR embedded on adjacent inputs. Any distributed non-optimally accurate ϵ-differentially private protocol with ϵ > 0, for a constant range of non-optimal accuracies and constant range of values of ϵ, computing a functionality with a boolean XOR embedded on adjacent inputs. Enroute to proving these results, we demonstrate a connection between optimally-accurate twoparty differentially-private protocols for functions with a boolean XOR embedded on adjacent inputs, and noisy channels, which were shown by Crépeau and Kilian [FOCS 1988] to be sufficient for oblivious transfer.
KW - Distributed Differential Privacy
KW - Noisy Channels
KW - Oblivious Transfer
KW - Weak Noisy Channels
UR - http://www.scopus.com/inward/record.url?scp=85012869318&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85012869318&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.ICALP.2016.29
DO - 10.4230/LIPIcs.ICALP.2016.29
M3 - Conference contribution
AN - SCOPUS:85012869318
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - 43rd International Colloquium on Automata, Languages, and Programming, ICALP 2016
A2 - Rabani, Yuval
A2 - Chatzigiannakis, Ioannis
A2 - Sangiorgi, Davide
A2 - Mitzenmacher, Michael
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 43rd International Colloquium on Automata, Languages, and Programming, ICALP 2016
Y2 - 12 July 2016 through 15 July 2016
ER -