Method for differentially private aggregation in a star topology under a realistic adversarial model
First Claim
Patent Images
1. A system comprising one or more processors, the one or more processors comprising an aggregator and a plurality of participants, each participant of the plurality of participants being configured to add a noise component to a data component, and the aggregator configured to:
- receive homomorphic encryptions of the noise components from each participant of the plurality of participants, wherein the noise components are sampled from a probability distribution;
decrypt the homomorphic encryptions of the noise components to determine an overall noise term based on a subset of the noise components; and
combine the noise components into the overall noise term, wherein the overall noise term is used to modify an aggregate function of the data components;
wherein the aggregator is further configured to compute the overall noise term from an aggregation of n noise components while hiding which n noise components were included in the overall noise term from all participants of the plurality of participants.
7 Assignments
0 Petitions
Accused Products
Abstract
One embodiment provides a system for noise addition to enforce data privacy protection in a star network. In operation, participants may add a noise component to a dataset. An aggregator may receive the noise components from the plurality of participants, compute an overall noise term based on the received noise components, and aggregate values using the noise components and overall noise term.
-
Citations
13 Claims
-
1. A system comprising one or more processors, the one or more processors comprising an aggregator and a plurality of participants, each participant of the plurality of participants being configured to add a noise component to a data component, and the aggregator configured to:
-
receive homomorphic encryptions of the noise components from each participant of the plurality of participants, wherein the noise components are sampled from a probability distribution; decrypt the homomorphic encryptions of the noise components to determine an overall noise term based on a subset of the noise components; and combine the noise components into the overall noise term, wherein the overall noise term is used to modify an aggregate function of the data components; wherein the aggregator is further configured to compute the overall noise term from an aggregation of n noise components while hiding which n noise components were included in the overall noise term from all participants of the plurality of participants. - View Dependent Claims (2, 3, 4, 5, 13)
-
-
6. A computer-implemented method for noise addition to enforce data privacy, the method comprising:
-
generating binary sequences; generating homomorphic encryptions of the binary sequences to form ciphertexts; sending the ciphertexts to each participant of the plurality of participants; selecting, based on the ciphertext received at each participant, noise components sampled by the participant from a probability distribution to generate an encrypted value at each participant; computing an overall noise term by aggregating n noise components while hiding which n noise components were included in the overall noise term from all participants of the plurality of participants; receiving the encrypted value from each participant of the plurality of participants; decrypting the encrypted value; and
,aggregating the decrypted values with a private aggregation protocol. - View Dependent Claims (8, 9, 10, 11)
-
-
7. A computer-implemented method for noise addition to enforce data privacy, the method comprising:
-
generating binary sequences; generating homomorphic encryptions of the binary sequences to form ciphertexts; sending the ciphertexts to each participant of the plurality of participants; selecting, based on the ciphertext received at each participant, noise components sampled by the participant from a probability distribution to generate an encrypted value at each participant; receiving the encrypted value from each participant of the plurality of participants; decrypting the encrypted value; and
,aggregating the decrypted values with a private aggregation protocol; wherein the encrypted values are denoted as ei,j, and are computed with the following formula;
ei,j=EvA (bi,j)ξi,j ·
EvA (ri,j)wherein; Ev A is a function to generate a ciphertext based on public key vA;bi,j is a generated binary sequence; ξ
i,j is a noise component; andri,j is a blinding term.
-
-
12. A system for implementing differential privacy, the system comprising:
-
one or more processors; and a storage device storing instructions that when executed by the one or more processors cause the one or more processors to perform a method, the method comprising; generating binary sequences; generating homomorphic encryptions of the binary sequences to form ciphertexts; sending the ciphertexts to each participant of the plurality of participants; selecting, based on the ciphertext received at each participant, noise components sampled by the participant from a probability distribution to generate an encrypted value at each participant; computing an overall noise term by aggregating n noise components while hiding which n noise components were included in the overall noise term from all participants of the plurality of participants; receiving the encrypted value from each participant of the plurality of participants; decrypting the received encrypted value; and
,aggregating the decrypted values with a private aggregation protocol.
-
Specification