Paper 2019/616

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

Iftach Haitner, Noam Mazor, Ronen Shaltiel, and Jad Silbak

Abstract

Consider a PPT two-party protocol Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB{0,1}, and let VA and VB denote the parties' individual views. Protocol Π has α-agreement if Pr[OA=OB]=1/2+α. The leakage of ϵ is the amount of information a party obtains about the event {OA=OB}; that is, the leakage ϵ is the maximum, over P{A,B}, of the distance between VP|OA=OB and VP|OAOB. Typically, this distance is measured in statistical distance, or, in the computational setting, in computational indistinguishability. For this choice, Wullschleger [TCC '09] showed that if ϵ<<α then the protocol can be transformed into an OT protocol. We consider measuring the protocol leakage by the log-ratio distance (which was popularized by its use in the differential privacy framework). The log-ratio distance between over domain is the minimal for which, for every . In the computational setting, we use computational indistinguishability from having log-ratio distance . We show that a protocol with (noticeable) accuracy can be transformed into an OT protocol (note that this allows ). We complete the picture, in this respect, showing that a protocol with does not necessarily imply OT. Our results hold for both the information theoretic and the computational settings, and can be viewed as a ``fine grained'' approach to ``weak OT amplification''. We then use the above result to fully characterize the complexity of differentially private two-party computation for the XOR function, answering the open question put by Goyal, Khurana, Mironov, Pandey, and Sahai [ICALP '16] and Haitner, Nissim, Omri, Shaltiel, and Silbak [FOCS '18]. Specifically, we show that for any (noticeable) , a two-party protocol that computes the XOR function with -accuracy and -differential privacy can be transformed into an OT protocol. This improves upon Goyal et al. that only handle , and upon Haitner et al. who showed that such a protocol implies (infinitely-often) key agreement (and not OT). Our characterization is tight since OT does not follow from protocols in which , and extends to functions (over many bits) that ``contain'' an ``embedded copy'' of the XOR function.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint. MINOR revision.
Keywords
oblivious transferdifferential privacyhardness amplification
Contact author(s)
iftachh @ cs tau ac il
noammaz @ gmail com
jadsilbak @ gmail com
ronen @ cs haifa ac il
History
2019-09-19: revised
2019-06-03: received
See all versions
Short URL
https://ia.cr/2019/616
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/616,
      author = {Iftach Haitner and Noam Mazor and Ronen Shaltiel and Jad Silbak},
      title = {Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/616},
      year = {2019},
      url = {https://eprint.iacr.org/2019/616}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.