References & Citations
Computer Science > Cryptography and Security
Title: Tight Data Access Bounds for Private Top-$k$ Selection
(Submitted on 31 Jan 2023 (v1), last revised 30 May 2023 (this version, v2))
Abstract: We study the top-$k$ selection problem under the differential privacy model: $m$ items are rated according to votes of a set of clients. We consider a setting in which algorithms can retrieve data via a sequence of accesses, each either a random access or a sorted access; the goal is to minimize the total number of data accesses. Our algorithm requires only $O(\sqrt{mk})$ expected accesses: to our knowledge, this is the first sublinear data-access upper bound for this problem. Our analysis also shows that the well-known exponential mechanism requires only $O(\sqrt{m})$ expected accesses. Accompanying this, we develop the first lower bounds for the problem, in three settings: only random accesses; only sorted accesses; a sequence of accesses of either kind. We show that, to avoid $\Omega(m)$ access cost, supporting *both* kinds of access is necessary, and that in this case our algorithm's access cost is optimal.
Submission history
From: Hao Wu [view email][v1] Tue, 31 Jan 2023 00:33:56 GMT (114kb,D)
[v2] Tue, 30 May 2023 05:02:57 GMT (128kb,D)
Link back to: arXiv, form interface, contact.