Functionally Private Approximations of Negligibly-Biased Estimators

We study functionally private approximations. An approximation function $g$ is {\em functionally private} with respect to $f$ if, for any input $x$, $g(x)$ reveals no more information about $x$ than $f(x)$. Our main result states that a function $f$ admits an efficiently-computable functionally private approximation $g$ if there exists an efficiently-computable and negligibly-biased estimator for $f$. Contrary to previous generic results, our theorem is more general and has a wider application reach.We provide two distinct applications of the above result to demonstrate its flexibility. In the data stream model, we provide a functionally private approximation to the $L_p$-norm estimation problem, a quintessential application in streaming, using only polylogarithmic space in the input size. The privacy guarantees rely on the use of pseudo-random {\em functions} (PRF) (a stronger cryptographic notion than pseudo-random generators) of which can be based on common cryptographic assumptions.The application of PRFs in this context appears to be novel and we expect other results to follow suit.Moreover, this is the first known functionally private streaming result for {\em any} problem. Our second application result states that every problem in some subclasses of \SP of hard counting problems admit efficient and functionally private approximation protocols. This result is based on a functionally private approximation for the \SDNF problem (or estimating the number of satisfiable truth assignments to a Boolean formula in disjunctive normal form), which is an application of our main theorem and previously known results.

[1]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[2]  Joan Feigenbaum,et al.  Secure Multiparty Computation of Approximations , 2001, ICALP.

[3]  Richard M. Karp,et al.  Monte-Carlo algorithms for enumeration and reliability problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).

[4]  Robert Krauthgamer,et al.  Private approximation of NP-hard functions , 2001, STOC '01.

[5]  K. V. Subrahmanyam,et al.  Descriptive Complexity of #P Functions , 1995, J. Comput. Syst. Sci..

[6]  S. Janson Stable distributions , 2011, 1112.0220.

[7]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[8]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[9]  Moni Naor,et al.  Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[10]  S. Muthukrishnan,et al.  Data streams: algorithms and applications , 2005, SODA '03.

[11]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[12]  Joe Kilian,et al.  Fast Private Norm Estimation and Heavy Hitters , 2008, TCC.

[13]  David P. Woodruff,et al.  Polylogarithmic Private Approximations and Efficient Matching , 2006, TCC.

[14]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[15]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[16]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computations , 1990, STOC '90.

[17]  J. Spouge Computation of the gamma, digamma, and trigamma functions , 1994 .

[18]  Ping Li,et al.  Estimators and tail bounds for dimension reduction in lα (0 < α ≤ 2) using stable random projections , 2008, SODA '08.

[19]  Leslie G. Valiant,et al.  The Complexity of Enumeration and Reliability Problems , 1979, SIAM J. Comput..