TY - GEN
T1 - Differentially Private Distributed Matrix Multiplication
T2 - 2022 IEEE International Symposium on Information Theory, ISIT 2022
AU - Devulapalli, Ateet
AU - Cadambe, Viveck R.
AU - Calmon, Flavio P.
AU - Jeong, Haewon
N1 - Funding Information:
This material is based upon work supported by the National Science Foundation under grants CIF 1900750, CAREER 1845852, and CCF 1763657.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - The classic BGW algorithm of Ben Or, Goldwasser and Wigderson for secure multiparty computing demonstrates that secure distributed matrix multiplication over finite fields is possible over 2t+1 computation nodes, while keeping the input matrices private from every t colluding computation nodes. In this paper, we develop and study a novel coding formulation to explore the trade-offs between computation accuracy and privacy in secure multiparty computing for real-valued data, even with fewer than 2t+1 nodes, through a differential privacy perspective. For the case of t = 1, we develop achievable schemes and converse arguments that bound ϵ - the differential privacy parameter that measures the privacy loss - for a given accuracy level. Our achievable coding schemes are specializations of Shamir secret sharing applied to real-valued data, coupled with appropriate choice of evaluation points. We develop converse arguments that apply for general additive noise based schemes.
AB - The classic BGW algorithm of Ben Or, Goldwasser and Wigderson for secure multiparty computing demonstrates that secure distributed matrix multiplication over finite fields is possible over 2t+1 computation nodes, while keeping the input matrices private from every t colluding computation nodes. In this paper, we develop and study a novel coding formulation to explore the trade-offs between computation accuracy and privacy in secure multiparty computing for real-valued data, even with fewer than 2t+1 nodes, through a differential privacy perspective. For the case of t = 1, we develop achievable schemes and converse arguments that bound ϵ - the differential privacy parameter that measures the privacy loss - for a given accuracy level. Our achievable coding schemes are specializations of Shamir secret sharing applied to real-valued data, coupled with appropriate choice of evaluation points. We develop converse arguments that apply for general additive noise based schemes.
UR - http://www.scopus.com/inward/record.url?scp=85136275781&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85136275781&partnerID=8YFLogxK
U2 - 10.1109/ISIT50566.2022.9834493
DO - 10.1109/ISIT50566.2022.9834493
M3 - Conference contribution
AN - SCOPUS:85136275781
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 2016
EP - 2021
BT - 2022 IEEE International Symposium on Information Theory, ISIT 2022
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 26 June 2022 through 1 July 2022
ER -