{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:05:12Z","timestamp":1772042712455,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474123.3486764","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T15:41:53Z","timestamp":1636126913000},"page":"59-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving Randomized Controlled Trials"],"prefix":"10.1145","author":[{"given":"Mahnush","family":"Movahedi","sequence":"first","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Benjamin M.","family":"Case","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"James","family":"Honaker","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Andrew","family":"Knox","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Yiming Paul","family":"Li","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Sanjay","family":"Saravanan","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Shubho","family":"Sengupta","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]},{"given":"Erik","family":"Taubeneck","sequence":"additional","affiliation":[{"name":"Facebook, Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2019. TF Encrypted: Machine Learning on Encrypted Data in TensorFlow. https: \/\/tf-encrypted.io\/.  2019. TF Encrypted: Machine Learning on Encrypted Data in TensorFlow. https: \/\/tf-encrypted.io\/."},{"key":"e_1_3_2_2_2_1","unstructured":"2020. Facebook Conversion Lift. https:\/\/www.facebook.com\/business\/m\/one- sheeters\/conversion-lift  2020. Facebook Conversion Lift. https:\/\/www.facebook.com\/business\/m\/one- sheeters\/conversion-lift"},{"key":"e_1_3_2_2_3_1","first-page":"1","article-title":"Differentially Private Inference for Binomial Data","volume":"10","author":"Awan Jordan","year":"2019","unstructured":"Jordan Awan and Aleksandra Slavkovic . 2019 . Differentially Private Inference for Binomial Data . Journal of Privacy and Confidentiality , Vol. 10 , 1 (mar 2019). arxiv: 1904.00459 http:\/\/arxiv.org\/abs\/1904.00459 Jordan Awan and Aleksandra Slavkovic. 2019. Differentially Private Inference for Binomial Data. Journal of Privacy and Confidentiality, Vol. 10, 1 (mar 2019). arxiv: 1904.00459 http:\/\/arxiv.org\/abs\/1904.00459","journal-title":"Journal of Privacy and Confidentiality"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"e_1_3_2_2_7_1","volume-title":"Bootstrap inference and differential privacy: Standard errors for free. Unpublished Manuscript","author":"Brawner Thomas","year":"2018","unstructured":"Thomas Brawner and James Honaker . 2018. Bootstrap inference and differential privacy: Standard errors for free. Unpublished Manuscript ( 2018 ). Thomas Brawner and James Honaker. 2018. Bootstrap inference and differential privacy: Standard errors for free. Unpublished Manuscript (2018)."},{"key":"e_1_3_2_2_9_1","series-title":"Lecture Notes in Computer Science","volume-title":"Concentrated differential privacy: Simplifications, extensions, and lower bounds","author":"Bun Mark","year":"2016","unstructured":"Mark Bun and Thomas Steinke . 2016. Concentrated differential privacy: Simplifications, extensions, and lower bounds . Lecture Notes in Computer Science , Vol. 9985 LNCS ( 2016 ), 635--658. https:\/\/doi.org\/10.1007\/978-3-662-53641-4_24 arxiv: 1605.02065 10.1007\/978-3-662-53641-4_24 Mark Bun and Thomas Steinke. 2016. Concentrated differential privacy: Simplifications, extensions, and lower bounds. Lecture Notes in Computer Science, Vol. 9985 LNCS (2016), 635--658. https:\/\/doi.org\/10.1007\/978-3-662-53641-4_24 arxiv: 1605.02065"},{"key":"e_1_3_2_2_10_1","volume-title":"EzPC: programmable, efficient, and scalable secure two-party computation for machine learning. ePrint Report","author":"Chandran Nishanth","year":"2017","unstructured":"Nishanth Chandran , Divya Gupta , Aseem Rastogi , Rahul Sharma , and Shardul Tripathi . 2017. EzPC: programmable, efficient, and scalable secure two-party computation for machine learning. ePrint Report , Vol. 1109 ( 2017 ). Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, and Shardul Tripathi. 2017. EzPC: programmable, efficient, and scalable secure two-party computation for machine learning. ePrint Report, Vol. 1109 (2017)."},{"key":"e_1_3_2_2_11_1","volume-title":"Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy. Presentation to Joint Statistical Meetings of the American Statistical Association","author":"Covington Christian","year":"2021","unstructured":"Christian Covington , Xi He , James Honaker , and Gautam Kamath . 2021. Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy. Presentation to Joint Statistical Meetings of the American Statistical Association ( 2021 ). Christian Covington, Xi He, James Honaker, and Gautam Kamath. 2021. Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy. Presentation to Joint Statistical Meetings of the American Statistical Association (2021)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_17"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation.. In NDSS.  Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation.. In NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_2_15_1","unstructured":"FRESCO development team. FRESCO Documentation Release. (2018). https:\/\/fresco.readthedocs.io\/_\/downloads\/en\/latest\/pdf\/.  FRESCO development team. FRESCO Documentation Release. (2018). https:\/\/fresco.readthedocs.io\/_\/downloads\/en\/latest\/pdf\/."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2676160"},{"key":"e_1_3_2_2_17_1","volume-title":"Differentially private confidence intervals. arXiv preprint arXiv:2001.02285","author":"Du Wenxin","year":"2020","unstructured":"Wenxin Du , Canyon Foot , Monica Moniot , Andrew Bray , and Adam Groce . 2020. Differentially private confidence intervals. arXiv preprint arXiv:2001.02285 ( 2020 ). Wenxin Du, Canyon Foot, Monica Moniot, Andrew Bray, and Adam Groce. 2020. Differentially private confidence intervals. arXiv preprint arXiv:2001.02285 (2020)."},{"key":"e_1_3_2_2_18_1","series-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics )","volume-title":"Calibrating Noise to Sensitivity in Private Data Analysis","author":"Dwork Cynthia","year":"1878","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating Noise to Sensitivity in Private Data Analysis . In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics ) , Vol. 3876 LNCS. 265--284. https:\/\/doi.org\/10.1007\/1168 1878 _14 10.1007\/11681878_14 Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics ), Vol. 3876 LNCS. 265--284. https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_20_1","volume-title":"Annual Review of Statistics and Its Application (2017)","author":"Dwork Cynthia","year":"2017","unstructured":"Cynthia Dwork , Adam Smith , Thomas Steinke , and Jonathan Ullman . 2017. Exposed! A Survey of Attacks on Private Data . Annual Review of Statistics and Its Application (2017) ( 2017 ). Cynthia Dwork, Adam Smith, Thomas Steinke, and Jonathan Ullman. 2017. Exposed! A Survey of Attacks on Private Data. Annual Review of Statistics and Its Application (2017) (2017)."},{"key":"e_1_3_2_2_21_1","unstructured":"Georgina Evans Gary King Margaret Schwenzfeier and Abhradeep Thakurta. Statistically valid inferences from privacy protected data. (2019).  Georgina Evans Gary King Margaret Schwenzfeier and Abhradeep Thakurta. Statistically valid inferences from privacy protected data. (2019)."},{"key":"e_1_3_2_2_22_1","volume-title":"Facebook Private Computation Framework. https:\/\/github.com\/facebookresearch\/fbpcf. (Aug","year":"2021","unstructured":"Facebook. Facebook Private Computation Framework. https:\/\/github.com\/facebookresearch\/fbpcf. (Aug . 2021 ). Facebook. Facebook Private Computation Framework. https:\/\/github.com\/facebookresearch\/fbpcf. (Aug. 2021)."},{"key":"e_1_3_2_2_23_1","volume-title":"General-Purpose Differentially-Private Confidence Intervals. arXiv preprint arXiv:2006.07749","author":"Ferrando Cecilia","year":"2020","unstructured":"Cecilia Ferrando , Shufan Wang , and Daniel Sheldon . 2020. General-Purpose Differentially-Private Confidence Intervals. arXiv preprint arXiv:2006.07749 ( 2020 ). Cecilia Ferrando, Shufan Wang, and Daniel Sheldon. 2020. General-Purpose Differentially-Private Confidence Intervals. arXiv preprint arXiv:2006.07749 (2020)."},{"key":"e_1_3_2_2_24_1","volume-title":"Methods Work Group Third US Preventive, and Services Task Force","author":"Harris Russell P","year":"2001","unstructured":"Russell P Harris , Mark Helfand , Steven H Woolf , Kathleen N Lohr , Cynthia D Mulrow , Steven M Teutsch , David Atkins , Methods Work Group Third US Preventive, and Services Task Force . 2001 . Current methods of the US Preventive Services Task Force: a review of the process. American journal of preventive medicine, Vol. 20 , 3 (2001), 21--35. Russell P Harris, Mark Helfand, Steven H Woolf, Kathleen N Lohr, Cynthia D Mulrow, Steven M Teutsch, David Atkins, Methods Work Group Third US Preventive, and Services Task Force. 2001. Current methods of the US Preventive Services Task Force: a review of the process. American journal of preventive medicine, Vol. 20, 3 (2001), 21--35."},{"key":"e_1_3_2_2_25_1","volume-title":"SoK: General Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP). 1220--1237","author":"Hastings Marcella","year":"2019","unstructured":"Marcella Hastings , Brett Hemenway , Daniel Noble , and Steve Zdancewic . 2019 . SoK: General Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP). 1220--1237 . https:\/\/doi.org\/10.1109\/SP.2019.00028 10.1109\/SP.2019.00028 Marcella Hastings, Brett Hemenway, Daniel Noble, and Steve Zdancewic. 2019. SoK: General Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP). 1220--1237. https:\/\/doi.org\/10.1109\/SP.2019.00028"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"e_1_3_2_2_28_1","unstructured":"Yan Huang David Evans and Jonathan Katz. 2012. Private set intersection: Are garbled circuits better than custom protocols?. In NDSS.  Yan Huang David Evans and Jonathan Katz. 2012. Private set intersection: Are garbled circuits better than custom protocols?. In NDSS."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00031"},{"key":"e_1_3_2_2_30_1","volume-title":"Finite sample differentially private confidence intervals. arXiv preprint arXiv:1711.03908","author":"Karwa Vishesh","year":"2017","unstructured":"Vishesh Karwa and Salil Vadhan . 2017. Finite sample differentially private confidence intervals. arXiv preprint arXiv:1711.03908 ( 2017 ). Vishesh Karwa and Salil Vadhan. 2017. Finite sample differentially private confidence intervals. arXiv preprint arXiv:1711.03908 (2017)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Andrew Mcgregor Ilya Mironov Toniann Pitassi Omer Reingold Kunal Talwar and Salil Vadhan. 2011. The Limits of Two-Party Differential Privacy. (2011).  Andrew Mcgregor Ilya Mironov Toniann Pitassi Omer Reingold Kunal Talwar and Salil Vadhan. 2011. The Limits of Two-Party Differential Privacy. (2011).","DOI":"10.1109\/FOCS.2010.14"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.20"},{"key":"e_1_3_2_2_34_1","volume-title":"Phasing: Private set intersection using permutation-based hashing. In 24th {USENIX} Security Symposium ($$USENIX$$ Security 15). 515--530.","author":"Pinkas Benny","year":"2015","unstructured":"Benny Pinkas , Thomas Schneider , Gil Segev , and Michael Zohner . 2015 . Phasing: Private set intersection using permutation-based hashing. In 24th {USENIX} Security Symposium ($$USENIX$$ Security 15). 515--530. Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. 2015. Phasing: Private set intersection using permutation-based hashing. In 24th {USENIX} Security Symposium ($$USENIX$$ Security 15). 515--530."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_5"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.006"},{"key":"e_1_3_2_2_38_1","unstructured":"Berry Schoenmakers. MPyC -- Python Package for Secure Multiparty Computation. Theory and Practice of Multiparty Computation (TPMPC). (2018). https:\/\/www.win.tue.nl\/ berry\/mpyc\/.  Berry Schoenmakers. MPyC -- Python Package for Secure Multiparty Computation. Theory and Practice of Multiparty Computation (TPMPC). (2018). https:\/\/www.win.tue.nl\/ berry\/mpyc\/."},{"key":"e_1_3_2_2_39_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit. (2016).  Xiao Wang Alex J. Malozemoff and Jonathan Katz. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit. (2016)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56617-7_14"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134053"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474123.3486764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474123.3486764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:35Z","timestamp":1750191455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474123.3486764"}},"subtitle":["A Protocol for Industry Scale Deployment"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":36,"alternative-id":["10.1145\/3474123.3486764","10.1145\/3474123"],"URL":"https:\/\/doi.org\/10.1145\/3474123.3486764","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}