{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:56:39Z","timestamp":1773388599053,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616641","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"2262-2276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8849-8808","authenticated-orcid":false,"given":"Chengkun","family":"Wei","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7844-718X","authenticated-orcid":false,"given":"Ruijing","family":"Yu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3712-8304","authenticated-orcid":false,"given":"Yuan","family":"Fan","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1674-4701","authenticated-orcid":false,"given":"Wenzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-7947","authenticated-orcid":false,"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232954"},{"key":"e_1_3_2_1_2_1","volume-title":"Separating local & shuffled differential privacy via histograms. arXiv preprint arXiv:1911.06879","author":"Balcer Victor","year":"2019","unstructured":"Victor Balcer and Albert Cheu. 2019. Separating local & shuffled differential privacy via histograms. arXiv preprint arXiv:1911.06879 (2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"22nd ACM STOC.","author":"Beaver D","unstructured":"D Beaver, S Micali, and P Rogaway. The round complexity of secure protocols extended abstract. In 22nd ACM STOC."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_5_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 2147--2164.","author":"B\u00f6hler Jonas","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure multi-party computation of differentially private median. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2147--2164."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum. 2021. Secure Multi-party Computation of Differentially Private Heavy Hitters. (2021).","DOI":"10.1145\/3460120.3484557"},{"key":"e_1_3_2_1_7_1","volume-title":"The discrete gaussian for differential privacy. arXiv preprint arXiv:2004.00010","author":"Canonne Cl\u00e9ment L","year":"2020","unstructured":"Cl\u00e9ment L Canonne, Gautam Kamath, and Thomas Steinke. 2020. The discrete gaussian for differential privacy. arXiv preprint arXiv:2004.00010 (2020)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354256"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-4730-9_14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting telemetry data privately. Advances in Neural Information Processing Systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_26"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-014-0218-3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664263"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680835090"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to play any mental game or a completeness theorem for protocols with honest majority. Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307--328.","DOI":"10.1145\/3335741.3335759"},{"key":"e_1_3_2_1_21_1","volume-title":"A comprehensive comparison of multiparty secure additions with differential privacy","author":"Goryczka Slawomir","year":"2015","unstructured":"Slawomir Goryczka and Li Xiong. 2015. A comprehensive comparison of multiparty secure additions with differential privacy. IEEE transactions on dependable and secure computing, Vol. 14, 5 (2015), 463--477."},{"key":"e_1_3_2_1_22_1","volume-title":"Differentially private bayesian learning on distributed data. Advances in neural information processing systems","author":"Heikkil\u00e4 Mikko","year":"2017","unstructured":"Mikko Heikkil\u00e4, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, and Antti Honkela. 2017. Differentially private bayesian learning on distributed data. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833672"},{"key":"e_1_3_2_1_24_1","volume-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation. arXiv preprint arXiv:2102.06387","author":"Kairouz Peter","year":"2021","unstructured":"Peter Kairouz, Ziyu Liu, and Thomas Steinke. 2021. The distributed discrete gaussian mechanism for federated learning with secure aggregation. arXiv preprint arXiv:2102.06387 (2021)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2814587"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317887"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2710016"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.14"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_5"},{"key":"e_1_3_2_1_33_1","volume-title":"Training Differentially Private Models with Secure Multiparty Computation. arXiv preprint arXiv:2202.02625","author":"Pentyala Sikha","year":"2022","unstructured":"Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, and Martine De Cock. 2022. Training Differentially Private Models with Secure Multiparty Computation. arXiv preprint arXiv:2202.02625 (2022)."},{"key":"e_1_3_2_1_34_1","unstructured":"Ryan Rogers. 2020. A Differentially Private Data Analytics $$API$$ at Scale. In 2020 {USENIX} Conference on Privacy Engineering Practice and Respect ($$PEPR$$ 20)."},{"key":"e_1_3_2_1_35_1","volume-title":"S Sahay, P Ahammad, and API LinkedIn's Audience Engagements.","author":"Rogers R","year":"2020","unstructured":"R Rogers, S Subramaniam, S Peng, D Durfee, S Lee, Santosh Kumar Kancha, S Sahay, P Ahammad, and API LinkedIn's Audience Engagements. 2020. A privacy preserving data analytics system at scale. Linkedin's audience engagements api (2020)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0149-6"},{"key":"e_1_3_2_1_37_1","unstructured":"Apple's Differential Privacy Team. 2017. Learning with privacy at scale. (2017)."},{"key":"e_1_3_2_1_38_1","unstructured":"WWDC. 2016. Engineering privacy for your users. (2016)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:49:50Z","timestamp":1755740990000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":39,"alternative-id":["10.1145\/3576915.3616641","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616641","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}