Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees

Georgia Tsaloli, Aikaterini Mitrokotsa

2019

Abstract

Often service providers need to outsource computations on sensitive datasets and subsequently publish statistical results over a population of users. In this setting, service providers want guarantees about the correctness of the computations, while individuals want guarantees that their sensitive information will remain private. Encryption mechanisms are not sufficient to avoid any leakage of information, since querying a database about individuals or requesting summary statistics can lead to leakage of information. Differential privacy addresses the paradox of learning nothing about an individual, while learning useful information about a population. Verifiable computation addresses the challenge of proving the correctness of computations. Although verifiable computation and differential privacy are important tools in this context, their interconnection has received limited attention. In this paper, we address the following question: How can we design a protocol that provides both differential privacy and verifiable computation guarantees for outsourced computations? We formally define the notion of verifiable differentially private computation (VDPC) and what are the minimal requirements needed to achieve VDPC. Furthermore, we propose a protocol that provides verifiable differentially private computation guarantees and discuss its security and privacy properties.

Download


Paper Citation


in Harvard Style

Tsaloli G. and Mitrokotsa A. (2019). Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, ISBN 978-989-758-378-0, pages 425-430. DOI: 10.5220/0007919404250430


in Bibtex Style

@conference{secrypt19,
author={Georgia Tsaloli and Aikaterini Mitrokotsa},
title={Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,},
year={2019},
pages={425-430},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007919404250430},
isbn={978-989-758-378-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,
TI - Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
SN - 978-989-758-378-0
AU - Tsaloli G.
AU - Mitrokotsa A.
PY - 2019
SP - 425
EP - 430
DO - 10.5220/0007919404250430