Secure Multi-party Computation of Differentially Private Heavy Hitters

32Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

Abstract

Private learning of top-k, i.e., the k most frequent values also called heavy hitters, is a common industry scenario: Companies want to privately learn, e.g., frequently typed new words to improve suggestions on mobile devices, often used browser settings, telemetry data of frequent crashes, heavily shared articles, etc. Real-world deployments often use local differential privacy, where distributed users share locally randomized data with an untrusted server. Central differential privacy, on the other hand, assumes access to the raw data and applies the randomization only once, on the aggregated result. These solutions either require large amounts of users for high accuracy (local model) or a trusted third party (central model).We present multi-party computation protocols HH and PEM of sketches (succinct data structures) to efficiently compute differentially private top-k: HH has running time linear in the size of the data and is applicable for very small data sets (hundreds of values), and PEM is sublinear in the data domain and provides better accuracy than HH for large data sizes. Our approaches are efficient (practical running time, requiring no output reconstruction as other sketches) and more accurate than local differential privacy even for a small number of users. In our experiments we were able to securely compute differentially private top-k in less than 10 minutes using 3 semi-honest computation parties distributed over the Internet with inputs from hundreds of users (HH) and input size that is independent of the user count (PEM, excluding count aggregation).

References Powered by Scopus

How to Share a Secret

11166Citations
N/AReaders
Get full text

Mechanism design via differential privacy

1882Citations
N/AReaders
Get full text

RAPPOR: Randomized aggregatable privacy-preserving ordinal response

1536Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy

19Citations
N/AReaders
Get full text

Federated Boosted Decision Trees with Differential Privacy

19Citations
N/AReaders
Get full text

Federated Analytics: A Survey

17Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Böhler, J., & Kerschbaum, F. (2021). Secure Multi-party Computation of Differentially Private Heavy Hitters. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2361–2377). Association for Computing Machinery. https://doi.org/10.1145/3460120.3484557

Readers over time

‘20‘21‘22‘23‘2405101520

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 16

73%

Professor / Associate Prof. 3

14%

Researcher 3

14%

Readers' Discipline

Tooltip

Computer Science 16

89%

Physics and Astronomy 1

6%

Economics, Econometrics and Finance 1

6%

Save time finding and organizing research with Mendeley

Sign up for free
0