We study Gaussian mechanism in the shuffle model of differential privacy (DP). Particularly, we characterize the mechanism's R\'enyi differential privacy (RDP), showing that it is of the form: $$ \epsilon(\lambda) \leq \frac{1}{\lambda-1}\log\left(\frac{e^{-\lambda/2\sigma^2}}{n^\lambda}\sum_{\substack{k_1+\dotsc+k_n=\lambda;\\k_1,\dotsc,k_n\geq 0}}\binom{\lambda}{k_1,\dotsc,k_n}e^{\sum_{i=1}^nk_i^2/2\sigma^2}\right) $$ We further prove that the RDP is strictly upper-bounded by the Gaussian RDP without shuffling. The shuffle Gaussian RDP is advantageous in composing multiple DP mechanisms, where we demonstrate its improvement over the state-of-the-art approximate DP composition theorems in privacy guarantees of the shuffle model. Moreover, ...
Differential privacy (DP) has been recently introduced to linear contextual bandits to formally addr...
Prior work on differential privacy analysis of randomized SGD algorithms relies on composition theor...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
We study a protocol for distributed computation called shuffled check-in, which achieves strong priv...
This work studies differential privacy in the context of the recently proposed shuffle model. Unlike...
The framework of differential privacy protects an individual's privacy while publishing query respon...
In this paper, we introduce the imperfect shuffle differential privacy model, where messages sent fr...
How to achieve distributed differential privacy (DP) without a trusted central party is of great int...
We study the problem of subsampling in differential privacy (DP), a question that is the centerpiece...
In recent years, privacy enhancing technologies have gained tremendous momentum and they are expecte...
International audienceWith the recent bloom of focus on digital economy, the importance of personal ...
Differential privacy is often studied in one of two models. In the central model, a single analyzer ...
Differential privacy has seen remarkable success as a rigorous and practical formalization of data p...
The Laplace mechanism and the Gaussian mechanism are primary mechanisms in differential privacy, wid...
Recently, it is shown that shuffling can amplify the central differential privacy guarantees of data...
Differential privacy (DP) has been recently introduced to linear contextual bandits to formally addr...
Prior work on differential privacy analysis of randomized SGD algorithms relies on composition theor...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
We study a protocol for distributed computation called shuffled check-in, which achieves strong priv...
This work studies differential privacy in the context of the recently proposed shuffle model. Unlike...
The framework of differential privacy protects an individual's privacy while publishing query respon...
In this paper, we introduce the imperfect shuffle differential privacy model, where messages sent fr...
How to achieve distributed differential privacy (DP) without a trusted central party is of great int...
We study the problem of subsampling in differential privacy (DP), a question that is the centerpiece...
In recent years, privacy enhancing technologies have gained tremendous momentum and they are expecte...
International audienceWith the recent bloom of focus on digital economy, the importance of personal ...
Differential privacy is often studied in one of two models. In the central model, a single analyzer ...
Differential privacy has seen remarkable success as a rigorous and practical formalization of data p...
The Laplace mechanism and the Gaussian mechanism are primary mechanisms in differential privacy, wid...
Recently, it is shown that shuffling can amplify the central differential privacy guarantees of data...
Differential privacy (DP) has been recently introduced to linear contextual bandits to formally addr...
Prior work on differential privacy analysis of randomized SGD algorithms relies on composition theor...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...