CARGO: Crypto-Assisted Differentially Private Triangle Counting without Trusted Servers
Abstract: Differentially private triangle counting in graphs is essential for analyzing connection patterns and calculating clustering coefficients while protecting sensitive individual information. Previous works have relied on either central or local models to enforce differential privacy. However, a significant utility gap exists between the central and local models of differentially private triangle counting, depending on whether or not a trusted server is needed. In particular, the central model provides a high accuracy but necessitates a trusted server. The local model does not require a trusted server but suffers from limited accuracy. Our paper introduces a crypto-assisted differentially private triangle counting system, named CARGO, leveraging cryptographic building blocks to improve the effectiveness of differentially private triangle counting without assumption of trusted servers. It achieves high utility similar to the central model but without the need for a trusted server like the local model. CARGO consists of three main components. First, we introduce a similarity-based projection method that reduces the global sensitivity while preserving more triangles via triangle homogeneity. Second, we present a triangle counting scheme based on the additive secret sharing that securely and accurately computes the triangles while protecting sensitive information. Third, we design a distributed perturbation algorithm that perturbs the triangle count with minimal but sufficient noise. We also provide a comprehensive theoretical and empirical analysis of our proposed methods. Extensive experiments demonstrate that our CARGO significantly outperforms the local model in terms of utility and achieves high-utility triangle counting comparable to the central model.
- C. Seshadhri and S. Tirthapura, “Scalable subgraph counting: the methods behind the madness,” in Companion Proceedings of The 2019 World Wide Web Conference, 2019, pp. 1317–1318.
- M. E. Newman, “Random graphs with clustering,” Physical review letters, vol. 103, no. 5, p. 058701, 2009.
- T. Schank and D. Wagner, “Approximating clustering coefficient and transitivity.” Journal of Graph Algorithms and Applications, vol. 9, no. 2, pp. 265–275, 2005.
- T. GOLDSMITH, “Assessing structural similarity of graphs,” Pathfinder Associative Networks: Studies in Knowledge Organization, pp. 75–87, 1990.
- C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen, “Privacy-preserving social network publication against friendship attacks,” in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, 2011, pp. 1262–1270.
- C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.
- N. Li, M. Lyu, D. Su, and W. Yang, “Differential privacy: From theory to practice,” Synthesis Lectures on Information Security, Privacy, & Trust, vol. 8, no. 4, pp. 1–138, 2016.
- X. Ding, S. Sheng, H. Zhou, X. Zhang, Z. Bao, P. Zhou, and H. Jin, “Differentially private triangle counting in large graphs,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 11, pp. 5278–5292, 2021.
- V. Karwa, S. Raskhodnikova, A. Smith, and G. Yaroslavtsev, “Private analysis of graph structure,” Proceedings of the VLDB Endowment, vol. 4, no. 11, pp. 1146–1157, 2011.
- S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith, “Analyzing graphs with node differential privacy,” in Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer, 2013, pp. 457–476.
- J. Imola, T. Murakami, and K. Chaudhuri, “Locally differentially private analysis of graph statistics.” in USENIX Security Symposium, 2021, pp. 983–1000.
- H. Sun, X. Xiao, I. Khalil, Y. Yang, Z. Qin, H. Wang, and T. Yu, “Analyzing subgraph statistics from extended local views with decentralized differential privacy,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 703–717.
- J. Imola, T. Murakami, and K. Chaudhuri, “Communication-efficient triangle counting under local differential privacy,” in 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 537–554.
- Q. Ye, H. Hu, M. H. Au, X. Meng, and X. Xiao, “Lf-gdpr: A framework for estimating graph metrics with local differential privacy,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 10, pp. 4905–4920, 2020.
- X. He, A. Machanavajjhala, C. Flynn, and D. Srivastava, “Composing differential privacy and secure computation: A case study on scaling private record linkage,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1389–1406.
- A. Roy Chowdhury, C. Wang, X. He, A. Machanavajjhala, and S. Jha, “Cryptε𝜀\varepsilonitalic_ε: Crypto-assisted differential privacy on untrusted servers,” in Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, 2020, pp. 603–619.
- E. Roth, D. Noble, B. H. Falk, and A. Haeberlen, “Honeycrisp: large-scale differentially private aggregation without a trusted core,” in Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019, pp. 196–210.
- X. Gu, M. Li, and L. Xiong, “Precad: Privacy-preserving and robust federated learning via crypto-aided differential privacy,” arXiv preprint arXiv:2110.11578, 2021.
- T. Stevens, C. Skalka, C. Vincent, J. Ring, S. Clark, and J. Near, “Efficient differentially private secure aggregation for federated learning via hardness of learning with errors,” in 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 1379–1395.
- S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, and Y. Zhou, “A hybrid approach to privacy-preserving federated learning,” in Proceedings of the 12th ACM workshop on artificial intelligence and security, 2019, pp. 1–11.
- L. Sun and L. Lyu, “Federated model distillation with noise-free differential privacy,” in Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI, 2021, pp. 1563–1570.
- C. Fu, H. Li, J. Lou, and J. Cui, “Dp-horus: Differentially private hierarchical count histograms under untrusted server,” in Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022, pp. 530–539.
- W.-Y. Day, N. Li, and M. Lyu, “Publishing graph degree distribution with node differential privacy,” in Proceedings of the 2016 International Conference on Management of Data, 2016, pp. 123–138.
- N. Durak, A. Pinar, T. G. Kolda, and C. Seshadhri, “Degree relations of triangles in real-world networks and graph models,” in Proceedings of the 21st ACM international conference on Information and knowledge management, 2012, pp. 1712–1716.
- A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
- E. Shi, H. Chan, E. Rieffel, R. Chow, and D. Song, “Privacy-preserving aggregation of time-series data,” in Annual Network & Distributed System Security Symposium (NDSS). Internet Society., 2011.
- G. Ács and C. Castelluccia, “I have a dream!(differentially private smart metering).” in Information hiding, vol. 6958. Springer, 2011, pp. 118–132.
- S. Goryczka and L. Xiong, “A comprehensive comparison of multiparty secure additions with differential privacy,” IEEE transactions on dependable and secure computing, vol. 14, no. 5, pp. 463–477, 2015.
- A. Patra, T. Schneider, A. Suresh, and H. Yalame, “Aby2. 0: Improved mixed-protocol secure two-party computation.” in USENIX Security Symposium, 2021, pp. 2165–2182.
- D. Rathee, M. Rathee, N. Kumar, N. Chandran, D. Gupta, A. Rastogi, and R. Sharma, “Cryptflow2: Practical 2-party secure inference,” in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, pp. 325–342.
- T. Murakami and Y. Kawamoto, “Utility-optimized local differential privacy mechanisms for distribution estimation,” in 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 1877–1894.
- T. Wang, J. Blocki, N. Li, and S. Jha, “Locally differentially private protocols for frequency estimation,” in 26th USENIX Security Symposium (USENIX Security 17), 2017, pp. 729–745.
- R. Chen, G. Acs, and C. Castelluccia, “Differentially private sequential data publication via variable-length n-grams,” in Proceedings of the 2012 ACM conference on Computer and communications security, 2012, pp. 638–649.
- V. Bindschaedler and R. Shokri, “Synthesizing plausible privacy-preserving location traces,” in 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016, pp. 546–563.
- M. Hay, C. Li, G. Miklau, and D. Jensen, “Accurate estimation of the degree distribution of private networks,” in 2009 Ninth IEEE International Conference on Data Mining. IEEE, 2009, pp. 169–178.
- S. Raskhodnikova and A. Smith, “Differentially private analysis of graphs,” Encyclopedia of Algorithms, 2016.
- Z. Qin, T. Yu, Y. Yang, I. Khalil, X. Xiao, and K. Ren, “Generating synthetic decentralized social graphs with local differential privacy,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 425–438.
- P. Mohassel and Y. Zhang, “Secureml: A system for scalable privacy-preserving machine learning,” in 2017 IEEE symposium on security and privacy (SP). IEEE, 2017, pp. 19–38.
- M. S. Riazi, C. Weinert, O. Tkachenko, E. M. Songhori, T. Schneider, and F. Koushanfar, “Chameleon: A hybrid secure computation framework for machine learning applications,” in Proceedings of the 2018 on Asia conference on computer and communications security, 2018, pp. 707–721.
- S. Zheng, Y. Cao, and M. Yoshikawa, “Secure shapley value for cross-silo federated learning,” Proceedings of the VLDB Endowment, vol. 16, no. 7, pp. 1657–1670, 2023.
- S. Liu, Y. Cao, T. Murakami, and M. Yoshikawa, “A crypto-assisted approach for publishing graph statistics with node local differential privacy,” in 2022 IEEE International Conference on Big Data (Big Data), 2022, pp. 5765–5774.
- M. O. Rabin, “How to exchange secrets with oblivious transfer,” Cryptology ePrint Archive, 2005.
- J. Kilian, “Founding crytpography on oblivious transfer,” in Proceedings of the twentieth annual ACM symposium on Theory of computing, 1988, pp. 20–31.
- Y. Lindell, “How to simulate it–a tutorial on the simulation proof technique,” Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich, pp. 277–346, 2017.
- W. Dong and K. Yi, “A nearly instance-optimal differentially private mechanism for conjunctive queries,” in Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2022, pp. 213–225.
- W. Dong and K. Yi, “Residual sensitivity for differentially private multi-way joins,” in SIGMOD/PODS’21: Proceedings of the 2021 International Conference on Management of Data, 2021.
- J. Leskovec and A. Krevl, “SNAP Datasets: Stanford large network dataset collection,” http://snap.stanford.edu/data, Jun. 2014.
- M. Yang, L. Lyu, J. Zhao, T. Zhu, and K.-Y. Lam, “Local differential privacy and its applications: A comprehensive survey,” arXiv preprint arXiv:2008.03686, 2020.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.