We study a protocol for distributed computation called shuffled check-in, which achieves strong privacy guarantees without requiring any further trust assumptions beyond a trusted shuffler. Unlike most existing work, shuffled check-in allows clients to make independent and random decisions to participate in the computation, removing the need for server-initiated subsampling. Leveraging differential privacy, we show that shuffled check-in achieves tight privacy guarantees through privacy amplification, with a novel analysis based on R{\'e}nyi differential privacy that improves privacy accounting over existing work. We also introduce a numerical approach to track the privacy of generic shuffling mechanisms, including Gaussian mechanism, which...
Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information ...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Recently, it is shown that shuffling can amplify the central differential privacy guarantees of data...
This work studies differential privacy in the context of the recently proposed shuffle model. Unlike...
We study Gaussian mechanism in the shuffle model of differential privacy (DP). Particularly, we char...
Differential privacy is often studied in one of two models. In the central model, a single analyzer ...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
How to achieve distributed differential privacy (DP) without a trusted central party is of great int...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...
In this paper, we introduce the imperfect shuffle differential privacy model, where messages sent fr...
Federated Learning, as a popular paradigm for collaborative training, is vulnerable against privacy ...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
There has been increasing interest in the problem of building accurate data mining models over aggre...
International audienceContextual bandit algorithms are widely used in domains where it is desirable ...
Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information ...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Recently, it is shown that shuffling can amplify the central differential privacy guarantees of data...
This work studies differential privacy in the context of the recently proposed shuffle model. Unlike...
We study Gaussian mechanism in the shuffle model of differential privacy (DP). Particularly, we char...
Differential privacy is often studied in one of two models. In the central model, a single analyzer ...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
How to achieve distributed differential privacy (DP) without a trusted central party is of great int...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...
In this paper, we introduce the imperfect shuffle differential privacy model, where messages sent fr...
Federated Learning, as a popular paradigm for collaborative training, is vulnerable against privacy ...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
There has been increasing interest in the problem of building accurate data mining models over aggre...
International audienceContextual bandit algorithms are widely used in domains where it is desirable ...
Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information ...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...