[Resource Topic] 2018/1051: Lower Bounds for Differentially Private RAMs

Welcome to the resource topic for 2018/1051

Title:
Lower Bounds for Differentially Private RAMs

Authors: Giuseppe Persiano, Kevin Yeo

Abstract:

In this work, we study privacy-preserving storage primitives that are suitable for use in data analysis on outsourced databases within the differential privacy framework. The goal in differentially private data analysis is to disclose global properties of a group without compromising any individual’s privacy. Typically, differentially private adversaries only ever learn global properties. For the case of outsourced databases, the adversary also views the patterns of access to data. Oblivious RAM (ORAM) can be used to hide access patterns but ORAM might be excessive as in some settings it could be sufficient to be compatible with differential privacy and only protect the privacy of individual accesses. We consider (\epsilon, \delta)-Differentially Private RAM, a weakening of ORAM that only protects individual operations and seems better suited for use in data analysis on outsourced databases. As differentially private RAM has weaker security than ORAM, there is hope that we can bypass the \Omega(\log(n/c)) bandwidth lower bounds for ORAM by Larsen and Nielsen [CRYPTO ’18] for storing an array of n entries and a client with c bits of memory. We answer in the negative and present an \Omega(\log(n/c)) bandwidth lower bound for privacy budgets of \epsilon = O(1) and \delta \le 1/3. The information transfer technique used for ORAM lower bounds does not seem adaptable for use with the weaker security guarantees of differential privacy. Instead, we prove our lower bounds by adapting the chronogram technique to our setting. To our knowledge, this is the first work that uses the chronogram technique for lower bounds on privacy-preserving storage primitives.

ePrint: https://eprint.iacr.org/2018/1051

Talk: https://www.youtube.com/watch?v=mSaXQS0jhrg

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .