File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Foundations of Differentially Oblivious Algorithms

TitleFoundations of Differentially Oblivious Algorithms
Authors
Issue Date2019
PublisherSociety for Industrial and Applied Mathematics.
Citation
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2019), San Diego, CA, USA, 6-9 January 2019, p. 2448-2467 How to Cite?
AbstractIt is well-known that a program's memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the technique of oblivious RAM (ORAM) simulation. Such an obliviousness notion has stimulated much debate. Although ORAM techniques have significantly improved over the past few years, the concrete overheads are arguably still undesirable for real-world systems — part of this overhead is in fact inherent due to a well-known logarithmic ORAM lower bound by Goldreich and Ostrovsky. To make matters worse, when the program's runtime or output length depend on secret inputs, it may be necessary to perform worst-case padding to achieve full obliviousness and thus incur possibly super-linear overheads. Inspired by the elegant notion of differential privacy, we initiate the study of a new notion of access pattern privacy, which we call “(∊, δ)-differential obliviousness”. We separate the notion of (∊, δ)-differential obliviousness from classical obliviousness by considering several fundamental algorithmic abstractions including sorting small-length keys, merging two sorted lists, and range query data structures (akin to binary search trees). We show that by adopting differential obliviousness with reasonable choices of ∊ and δ, not only can one circumvent several impossibilities pertaining to full obliviousness, one can also, in several cases, obtain meaningful privacy with little overhead relative to the non-private baselines (i.e., having privacy “almost for free”). On the other hand, we show that for very demanding choices of ∊ and δ, the same lower bounds for oblivious algorithms would be preserved for (∊, δ)-differential obliviousness.
Persistent Identifierhttp://hdl.handle.net/10722/290708

 

DC FieldValueLanguage
dc.contributor.authorChan, HTH-
dc.contributor.authorChung, KM-
dc.contributor.authorMaggs, BM-
dc.contributor.authorShi, E-
dc.date.accessioned2020-11-02T05:46:00Z-
dc.date.available2020-11-02T05:46:00Z-
dc.date.issued2019-
dc.identifier.citationProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2019), San Diego, CA, USA, 6-9 January 2019, p. 2448-2467-
dc.identifier.urihttp://hdl.handle.net/10722/290708-
dc.description.abstractIt is well-known that a program's memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the technique of oblivious RAM (ORAM) simulation. Such an obliviousness notion has stimulated much debate. Although ORAM techniques have significantly improved over the past few years, the concrete overheads are arguably still undesirable for real-world systems — part of this overhead is in fact inherent due to a well-known logarithmic ORAM lower bound by Goldreich and Ostrovsky. To make matters worse, when the program's runtime or output length depend on secret inputs, it may be necessary to perform worst-case padding to achieve full obliviousness and thus incur possibly super-linear overheads. Inspired by the elegant notion of differential privacy, we initiate the study of a new notion of access pattern privacy, which we call “(∊, δ)-differential obliviousness”. We separate the notion of (∊, δ)-differential obliviousness from classical obliviousness by considering several fundamental algorithmic abstractions including sorting small-length keys, merging two sorted lists, and range query data structures (akin to binary search trees). We show that by adopting differential obliviousness with reasonable choices of ∊ and δ, not only can one circumvent several impossibilities pertaining to full obliviousness, one can also, in several cases, obtain meaningful privacy with little overhead relative to the non-private baselines (i.e., having privacy “almost for free”). On the other hand, we show that for very demanding choices of ∊ and δ, the same lower bounds for oblivious algorithms would be preserved for (∊, δ)-differential obliviousness.-
dc.languageeng-
dc.publisherSociety for Industrial and Applied Mathematics.-
dc.relation.ispartofProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2019)-
dc.titleFoundations of Differentially Oblivious Algorithms-
dc.typeConference_Paper-
dc.identifier.emailChan, HTH: hubert@cs.hku.hk-
dc.identifier.authorityChan, HTH=rp01312-
dc.identifier.doi10.1137/1.9781611975482.150-
dc.identifier.scopuseid_2-s2.0-85065864205-
dc.identifier.hkuros318355-
dc.identifier.spage2448-
dc.identifier.epage2467-
dc.publisher.placePhiladelphia, PA-
dc.identifier.eisbn9781611975482-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats