Skip to main content

Showing 1–22 of 22 results for author: Gascón, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11607  [pdf, other

    cs.DS

    Private federated discovery of out-of-vocabulary words for Gboard

    Authors: Ziteng Sun, Peter Kairouz, Haicheng Sun, Adria Gascon, Ananda Theertha Suresh

    Abstract: The vocabulary of language models in Gboard, Google's keyboard application, plays a crucial role for improving user experience. One way to improve the vocabulary is to discover frequently typed out-of-vocabulary (OOV) words on user devices. This task requires strong privacy protection due to the sensitive nature of user input data. In this report, we present a private OOV discovery algorithm for G… ▽ More

    Submitted 18 April, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

  2. arXiv:2404.10764  [pdf, other

    cs.CR cs.LG

    Confidential Federated Computations

    Authors: Hubert Eichner, Daniel Ramage, Kallista Bonawitz, Dzmitry Huba, Tiziano Santoro, Brett McLarnon, Timon Van Overveldt, Nova Fallen, Peter Kairouz, Albert Cheu, Katharine Daly, Adria Gascon, Marco Gruteser, Brendan McMahan

    Abstract: Federated Learning and Analytics (FLA) have seen widespread adoption by technology platforms for processing sensitive on-device data. However, basic FLA systems have privacy limitations: they do not necessarily require anonymization mechanisms like differential privacy (DP), and provide limited protections against a potentially malicious service provider. Adding DP to a basic FLA system currently… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  3. arXiv:2307.13347  [pdf, other

    cs.DS cs.CR cs.IT

    Federated Heavy Hitter Recovery under Linear Sketching

    Authors: Adria Gascon, Peter Kairouz, Ziteng Sun, Ananda Theertha Suresh

    Abstract: Motivated by real-life deployments of multi-round federated analytics with secure aggregation, we investigate the fundamental communication-accuracy tradeoffs of the heavy hitter discovery and approximate (open-domain) histogram problems under a linear sketching constraint. We propose efficient algorithms based on local subsampling and invertible bloom look-up tables (IBLTs). We also show that our… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

  4. arXiv:2305.10867  [pdf, other

    cs.CR

    Amplification by Shuffling without Shuffling

    Authors: Borja Balle, James Bell, Adrià Gascón

    Abstract: Motivated by recent developments in the shuffle model of differential privacy, we propose a new approximate shuffling functionality called Alternating Shuffle, and provide a protocol implementing alternating shuffling in a single-server threat model where the adversary observes all communication. Unlike previous shuffling protocols in this threat model, the per-client communication of our protocol… ▽ More

    Submitted 7 September, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

    Journal ref: CCS 2023

  5. arXiv:2301.06167  [pdf

    cs.CY cs.CR

    UN Handbook on Privacy-Preserving Computation Techniques

    Authors: David W. Archer, Borja de Balle Pigem, Dan Bogdanov, Mark Craddock, Adria Gascon, Ronald Jansen, Matjaž Jug, Kim Laine, Robert McLellan, Olga Ohrimenko, Mariana Raykova, Andrew Trask, Simon Wardley

    Abstract: This paper describes privacy-preserving approaches for the statistical analysis. It describes motivations for privacy-preserving approaches for the statistical analysis of sensitive data, presents examples of use cases where such methods may apply and describes relevant technical capabilities to assure privacy preservation while still allowing analysis of sensitive data. Our focus is on methods th… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

    Comments: 50 pages

  6. arXiv:2111.02356  [pdf, other

    cs.CR cs.LG

    Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation

    Authors: Eugene Bagdasaryan, Peter Kairouz, Stefan Mellem, Adrià Gascón, Kallista Bonawitz, Deborah Estrin, Marco Gruteser

    Abstract: We design a scalable algorithm to privately generate location heatmaps over decentralized data from millions of user devices. It aims to ensure differential privacy before data becomes visible to a service provider while maintaining high data accuracy and minimizing resource consumption on users' devices. To achieve this, we revisit distributed differential privacy based on recent results in secur… ▽ More

    Submitted 26 June, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: In PETS'22

  7. arXiv:2109.07461  [pdf, other

    cs.CR cs.AI

    MPC-Friendly Commitments for Publicly Verifiable Covert Security

    Authors: Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner

    Abstract: We address the problem of efficiently verifying a commitment in a two-party computation. This addresses the scenario where a party P1 commits to a value $x$ to be used in a subsequent secure computation with another party P2 that wants to receive assurance that P1 did not cheat, i.e. that $x$ was indeed the value inputted into the secure computation. Our constructions operate in the publicly verif… ▽ More

    Submitted 27 January, 2022; v1 submitted 15 September, 2021; originally announced September 2021.

    Comments: Appeared at ACM CCS 2021

    Journal ref: ACM CCS 2021

  8. arXiv:2004.05574  [pdf, other

    cs.CR cs.LG

    PrivEdge: From Local to Distributed Private Training and Prediction

    Authors: Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro

    Abstract: Machine Learning as a Service (MLaaS) operators provide model training and prediction on the cloud. MLaaS applications often rely on centralised collection and aggregation of user data, which could lead to significant privacy concerns when dealing with sensitive personal data. To address this problem, we propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of user… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: IEEE Transactions on Information Forensics and Security (TIFS)

  9. Private Summation in the Multi-Message Shuffle Model

    Authors: Borja Balle, James Bell, Adria Gascon, Kobbi Nissim

    Abstract: The shuffle model of differential privacy (Erlingsson et al. SODA 2019; Cheu et al. EUROCRYPT 2019) and its close relative encode-shuffle-analyze (Bittau et al. SOSP 2017) provide a fertile middle ground between the well-known local and central models. Similarly to the local model, the shuffle model assumes an untrusted data collector who receives privatized messages from users, but in this case a… ▽ More

    Submitted 19 December, 2022; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Published at CCS'20

  10. arXiv:1912.04977  [pdf, other

    cs.LG cs.CR stat.ML

    Advances and Open Problems in Federated Learning

    Authors: Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson , et al. (34 additional authors not shown)

    Abstract: Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while keeping the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs re… ▽ More

    Submitted 8 March, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: Published in Foundations and Trends in Machine Learning Vol 4 Issue 1. See: https://www.nowpublishers.com/article/Details/MAL-083

  11. arXiv:1911.02624  [pdf, other

    cs.LG cs.NE cs.PL stat.ML

    Data Generation for Neural Programming by Example

    Authors: Judith Clymo, Haik Manukian, Nathanaël Fijalkow, Adrià Gascón, Brooks Paige

    Abstract: Programming by example is the problem of synthesizing a program from a small set of input / output pairs. Recent works applying machine learning methods to this task show promise, but are typically reliant on generating synthetic examples for training. A particular challenge lies in generating meaningful sets of inputs and outputs, which well-characterize a given program and accurately demonstrate… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

  12. arXiv:1910.03861  [pdf, other

    stat.ML cs.CR cs.LG

    Private Protocols for U-Statistics in the Local Model and Beyond

    Authors: James Bell, Aurélien Bellet, Adrià Gascón, Tejas Kulkarni

    Abstract: In this paper, we study the problem of computing $U$-statistics of degree $2$, i.e., quantities that come in the form of averages over pairs of data points, in the local model of differential privacy (LDP). The class of $U$-statistics covers many statistical estimates of interest, including Gini mean difference, Kendall's tau coefficient and Area under the ROC Curve (AUC), as well as empirical ris… ▽ More

    Submitted 2 March, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: Accepted to AISTATS 2020

  13. arXiv:1909.11225  [pdf, ps, other

    cs.CR

    Improved Summation from Shuffling

    Authors: Borja Balle, James Bell, Adria Gascon, Kobbi Nissim

    Abstract: A protocol by Ishai et al.\ (FOCS 2006) showing how to implement distributed $n$-party summation from secure shuffling has regained relevance in the context of the recently proposed \emph{shuffle model} of differential privacy, as it allows to attain the accuracy levels of the curator model at a moderate communication cost. To achieve statistical security $2^{-σ}$, the protocol by Ishai et al.\ re… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

  14. arXiv:1907.03372  [pdf, other

    cs.CR cs.LG

    QUOTIENT: Two-Party Secure Neural Network Training and Prediction

    Authors: Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón

    Abstract: Recently, there has been a wealth of effort devoted to the design of secure protocols for machine learning tasks. Much of this is aimed at enabling secure prediction from highly-accurate Deep Neural Networks (DNNs). However, as DNNs are trained on data, a key question is how such models can be also trained securely. The few prior works on secure DNN training have focused either on designing custom… ▽ More

    Submitted 7 July, 2019; originally announced July 2019.

  15. arXiv:1906.09116  [pdf, ps, other

    cs.CR stat.ML

    Differentially Private Summation with Multi-Message Shuffling

    Authors: Borja Balle, James Bell, Adria Gascon, Kobbi Nissim

    Abstract: In recent work, Cheu et al. (Eurocrypt 2019) proposed a protocol for $n$-party real summation in the shuffle model of differential privacy with $O_{ε, δ}(1)$ error and $Θ(ε\sqrt{n})$ one-bit messages per party. In contrast, every local model protocol for real summation must incur error $Ω(1/\sqrt{n})$, and there exist protocols matching this lower bound which require just one bit of communication… ▽ More

    Submitted 21 August, 2019; v1 submitted 20 June, 2019; originally announced June 2019.

  16. arXiv:1903.02837  [pdf, other

    cs.LG cs.CR stat.ML

    The Privacy Blanket of the Shuffle Model

    Authors: Borja Balle, James Bell, Adria Gascon, Kobbi Nissim

    Abstract: This work studies differential privacy in the context of the recently proposed shuffle model. Unlike in the local model, where the server collecting privatized data from users can track back an input to a specific user, in the shuffle model users submit their privatized inputs to a server anonymously. This setup yields a trust model which sits in between the classical curator and local models for… ▽ More

    Submitted 2 June, 2019; v1 submitted 7 March, 2019; originally announced March 2019.

  17. arXiv:1806.03461  [pdf, other

    cs.CR cs.LG stat.ML

    TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service

    Authors: Amartya Sanyal, Matt J. Kusner, Adrià Gascón, Varun Kanade

    Abstract: Machine learning methods are widely used for a variety of prediction problems. \emph{Prediction as a service} is a paradigm in which service providers with technological expertise and computational resources may perform predictions for clients. However, data privacy severely restricts the applicability of such services, unless measures to keep client data private (even from the service provider) a… ▽ More

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: Accepted at International Conference in Machine Learning (ICML), 2018

  18. arXiv:1806.03281  [pdf, other

    stat.ML cs.CR cs.CY cs.LG

    Blind Justice: Fairness with Encrypted Sensitive Attributes

    Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller

    Abstract: Recent work has explored how to train machine learning models which do not discriminate against any subgroup of the population as determined by sensitive attributes such as gender or race. To avoid disparate treatment, sensitive attributes should not be considered. On the other hand, in order to avoid disparate impact, sensitive attributes must be examined, e.g., in order to learn a fair model, or… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

    Comments: published at ICML 2018

    Journal ref: Proceedings of the 35th International Conference on Machine Learning, PMLR 80:2630-2639, 2018

  19. arXiv:1805.12482  [pdf, ps, other

    cs.CR

    How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Authors: David Butler, David Aspinall, Adria Gascon

    Abstract: In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping their inputs private. Recent breakthroughs are bringing MPC into practice, solving fundamental challenges for secure distributed computation. Just as with classic protocols for encryption and key exchange, precise guarantees are needed for MPC designs and implementations;… ▽ More

    Submitted 31 May, 2018; originally announced May 2018.

  20. arXiv:1802.05490  [pdf, ps, other

    cs.DS cs.FL

    Grammar-based Compression of Unranked Trees

    Authors: Adrià Gascón, Markus Lohrey, Sebastian Maneth, Carl Philipp Reh, Kurt Sieber

    Abstract: We introduce forest straight-line programs (FSLPs) as a compressed representation of unranked ordered node-labelled trees. FSLPs are based on the operations of forest algebra and generalize tree straight-line programs. We compare the succinctness of FSLPs with two other compression schemes for unranked trees: top dags and tree straight-line programs of first-child/next sibling encodings. Efficient… ▽ More

    Submitted 15 February, 2018; originally announced February 2018.

    Comments: Extended version of a paper at CSR 2018

    MSC Class: 68P30; 68Q42 ACM Class: E.4

  21. Synthesis of a simple self-stabilizing system

    Authors: Adrià Gascón, Ashish Tiwari

    Abstract: With the increasing importance of distributed systems as a computing paradigm, a systematic approach to their design is needed. Although the area of formal verification has made enormous advances towards this goal, the resulting functionalities are limited to detecting problems in a particular design. By means of a classical example, we illustrate a simple template-based approach to computer-ai… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: In Proceedings SYNT 2014, arXiv:1407.4937

    ACM Class: F.3.1; C.2.4

    Journal ref: EPTCS 157, 2014, pp. 5-16

  22. arXiv:1003.1632  [pdf, ps, other

    cs.LO

    Unification and Matching on Compressed Terms

    Authors: Adrià Gascón, Guillem Godoy, Manfred Schmidt-Schauß

    Abstract: Term unification plays an important role in many areas of computer science, especially in those related to logic. The universal mechanism of grammar-based compression for terms, in particular the so-called Singleton Tree Grammars (STG), have recently drawn considerable attention. Using STGs, terms of exponential size and height can be represented in linear space. Furthermore, the term representa… ▽ More

    Submitted 8 March, 2010; originally announced March 2010.

    Comments: This paper is posted at the Computing Research Repository (CoRR) as part of the process of submission to the journal ACM Transactions on Computational Logic (TOCL).

    ACM Class: F.4.1; F.4.2