Multiparty Computation with Statistical Input Confidentiality via Randomized Response

  • Josep Domingo-Ferrer
  • Rafael Mulero-Vellido
  • Jordi Soria-ComasEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11126)


We explore a setting in which a number of subjects want to compute on their pooled data while keeping the statistical confidentiality of their input. Statistical confidentiality is different from the cryptographic confidentiality guaranteed by cryptographic multiparty secure computation: whereas in the latter nothing is disclosed about the input, in statistical input confidentiality a noise-added version of the input is disclosed, which allows more flexible computations. We propose a protocol based on local anonymization via randomized response, whereby the empirical distribution of the data of the subjects is approximated. From that distribution, most statistical calculations can be approximated as well. Regarding the accuracy of the approximation, ceteris paribus it improves with the number of subjects. Large dimensionality (that is, a large number of attributes) decreases accuracy and we propose a strategy to mitigate the dimensionality problem. We show how to characterize the privacy guarantee for each subject in terms of differential privacy. Experimental work is reported on the attained accuracy as a function of the number of respondents, number of attributes and randomized response parameters.


Multiparty anonymous computation Randomized response Local anonymization Big data Privacy 


Acknowledgments and Disclaimer

The following funding sources are gratefully acknowledged: European Commission (H2020-700540 “CANVAS”), Government of Catalonia (ICREA Acadèmia Prize to J. Domingo-Ferrer) and Spanish Government (projects TIN2014-57364-C2-1-R “SmartGlacis” and TIN2015-70054-REDC). The views in this paper are the authors’ own and do not necessarily reflect the views of UNESCO or any of the funders.


  1. 1.
    Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: STOC (1988)Google Scholar
  2. 2.
    Chaudhuri, A., Mukerjee, R.: Randomized Response: Theory and Techniques. Marcel Dekker, New York (1988)zbMATHGoogle Scholar
  3. 3.
    Chaum, D., Crépeau, C., Damgaard, I.: Multiparty unconditionally secure protocols. In: STOC (1988)Google Scholar
  4. 4.
    Cramér, H.: Mathematical Methods of Statistics. Princeton University Press, Princeton (1946)zbMATHGoogle Scholar
  5. 5.
    Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). Scholar
  6. 6.
    Greenberg, B.G., Abul-Ela, A.-L.A., Simmons, W.R., Horvitz, D.G.: The unrelated question randomized response model: theoretical framework. J. Am. Stat. Assoc. 64(326), 520–539 (1969)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Lin, F., Cohen, W.W.: Power iteration clustering. In: Proceedings of the 27th International Conference on Machine Learning-ICML 2010 (2010)Google Scholar
  8. 8.
    Van den Hout, A.: Analyzing misclassified data: randomized response and post randomization. Ph.D. thesis, University of Utrecht (2004)Google Scholar
  9. 9.
    Wang, Y., Wu, X., Hu, D.: Using randomized response for differential privacy preserving data collection. Technical report DPL-2014-003. University of Arkansas (2014)Google Scholar
  10. 10.
    Wang, Y., Wu, X., Hu, D.: Using randomized response for differential privacy preserving data collection. In: EDBT/ICDT 2016 Joint Conference, Bordeaux, France (2016)Google Scholar
  11. 11.
    Warner, S.L.: Randomised response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965)CrossRefGoogle Scholar
  12. 12.
    Yao, A.: Protocols for secure computations. In: FOCS (1982)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Josep Domingo-Ferrer
    • 1
  • Rafael Mulero-Vellido
    • 1
  • Jordi Soria-Comas
    • 1
    Email author
  1. 1.Department of Computer Science and Mathematics, UNESCO Chair in Data Privacy, CYBERCAT-Center for Cybersecurity Research of CataloniaUniversitat Rovira i VirgiliTarragonaSpain

Personalised recommendations