On Communication Protocols That Compute Almost Privately
A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approximate privacy model for two-party communication recently introduced by Feigenbaum et al. . We explore the privacy properties of a natural class of communication protocols that we refer to as “dissection protocols”. Dissection protocols include, among others, the bisection auction in [9,10] and the bisection protocol for the millionaires problem in . Informally, in a dissection protocol the communicating parties are restricted to answering simple questions of the form “Is your input between the values α and β (under a pre-defined order over the possible inputs)?”.
We prove that for a large class of functions called tiling functions, which include the 2nd-price Vickrey auction, there always exists a dissection protocol that provides a constant average-case privacy approximation ratio for uniform or “almost uniform” probability distributions over inputs. To establish this result we present an interesting connection between the approximate privacy framework and basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not, in general, exist in the worst case. We also discuss extensions of the basic setup to more than two parties and to non-tiling functions, and provide calculations of privacy approximation ratios for two functions of interest.
KeywordsApproximate Privacy Auctions Communication Protocols
Unable to display preview. Download preview PDF.
- 1.Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: 41st ACM Symp. on Theory of Computing, pp. 351–360 (2009)Google Scholar
- 5.Chaum, D., Crépeau, C., Damgaard, I.: Multiparty, unconditionally secure protocols. In: 22th ACM Symposium on Theory of Computing, pp. 11–19 (1988)Google Scholar
- 8.Feigenbaum, J., Jaggard, A., Schapira, M.: Approximate Privacy: Foundations and Quantification. In: ACM Conference on Electronic Commerce, pp. 167–178 (2010)Google Scholar
- 12.Kifer, D., Lin, B.-R.: An Axiomatic View of Statistical Privacy and Utility. Journal of Privacy and Confidentiality (to appear)Google Scholar
- 16.Yao, A.C.: Some complexity questions related to distributive computing. In: 11th ACM Symposium on Theory of Computing, pp. 209–213 (1979)Google Scholar