{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:16Z","timestamp":1750309516582,"version":"3.41.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T00:00:00Z","timestamp":1734134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Google Faculty Research Award and NSF","award":["2112693, 2213057"],"award-info":[{"award-number":["2112693, 2213057"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2025,2,28]]},"abstract":"<jats:p>Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security models, the threat models do not account for information leakage from the output of secure function evaluation. Quantifying information disclosure about private inputs from observing the function outcome is the subject of this work. Motivated by the City of Boston gender pay gap studies, in this work, we focus on the computation of the average of salaries and quantify information disclosure about private inputs of one or more participants (the target) to an adversary via information-theoretic techniques. We study a number of distributions including log-normal, which is typically used for modeling salaries. We consequently evaluate information disclosure after repeated evaluation of the average function on overlapping inputs, as was done in the Boston gender pay study that ran multiple times, and provide recommendations for using the sum and average functions in secure computation applications. Our goal is to develop mechanisms that lower information disclosure about participants\u2019 inputs to a desired level and provide guidelines for setting up real-world secure evaluation of this function.<\/jats:p>","DOI":"10.1145\/3705004","type":"journal-article","created":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T10:13:21Z","timestamp":1732356801000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2028-5440","authenticated-orcid":false,"given":"Alessandro","family":"Baccarini","sequence":"first","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9934-2700","authenticated-orcid":false,"given":"Marina","family":"Blanton","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2821-6941","authenticated-orcid":false,"given":"Shaofeng","family":"Zou","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,12,14]]},"reference":[{"key":"e_1_3_3_2_2","first-page":"Springer, 71\u201392","volume-title":"Principles of Security and Trust","author":"Ah-Fat P.","year":"2017","unstructured":"P. Ah-Fat and M. Huth. 2017. Secure multi-party computation: Information flow of outputs and game theory. In Principles of Security and Trust. Springer, 71\u201392."},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_2","DOI":"10.1109\/TIT.2018.2886458"},{"doi-asserted-by":"publisher","key":"e_1_3_3_4_2","DOI":"10.2478\/popets-2020-0053"},{"key":"e_1_3_3_5_2","article-title":"Two and three-party digital goods auctions: Scalable privacy analysis","author":"Ah-Fat P.","year":"2020","unstructured":"P. Ah-Fat and M. Huth. 2020. Two and three-party digital goods auctions: Scalable privacy analysis. arXiv preprint arXiv:2009.09524.","journal-title":"arXiv preprint arXiv:2009.09524"},{"key":"e_1_3_3_6_2","first-page":"308","volume-title":"IEEE Computer Security Foundations Symposium","author":"Alvim M.","year":"2014","unstructured":"M. Alvim, K. Chatzikokolakis, A. McIver, C. Morgan, C. Palamidessi, and G. Smith. 2014. Additive and multiplicative notions of leakage, and their capacities. In IEEE Computer Security Foundations Symposium. 308\u2013322."},{"key":"e_1_3_3_7_2","first-page":"265","volume-title":"IEEE Computer Security Foundations Symposium","author":"Alvim M.","year":"2012","unstructured":"M. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith. 2012. Measuring information leakage using generalized gain functions. In IEEE Computer Security Foundations Symposium. 265\u2013279."},{"key":"e_1_3_3_8_2","first-page":"Springer, 120\u20131","volume-title":"Principles of Security and Trust","author":"Alvim M.","year":"2014","unstructured":"M. Alvim, A. Scedrov, and F. Schneider. 2014. When not all bits are equal: Worth-based information flow. In Principles of Security and Trust. Springer, 120\u2013139."},{"key":"e_1_3_3_9_2","first-page":"187","volume-title":"ACM Conference on Data and Application Security and Privacy (CODASPY\u201924)","author":"Baccarini A.","year":"2024","unstructured":"A. Baccarini, M. Blanton, and S. Zou. 2024. Understanding information disclosure from secure computation output: A study of average salary computation. In ACM Conference on Data and Application Security and Privacy (CODASPY\u201924). 187\u2013198."},{"doi-asserted-by":"publisher","key":"e_1_3_3_10_2","DOI":"10.1364\/JOSA.66.000211"},{"doi-asserted-by":"publisher","key":"e_1_3_3_11_2","DOI":"10.1109\/26.477480"},{"doi-asserted-by":"publisher","key":"e_1_3_3_12_2","DOI":"10.1109\/TVT.2004.823494"},{"key":"e_1_3_3_13_2","article-title":"The Apple PSI system","author":"Bhowmick A.","year":"2021","unstructured":"A. Bhowmick, D. Boneh, S. Myers, and K. Tarbe. 2021. The Apple PSI system. Retrieved from https:\/\/www.apple.com\/child-safety\/pdf\/Apple_PSI_System_Security_Protocol_and_Analysis.pdf","journal-title":"https:\/\/www.apple.com\/child-safety\/pdf\/Apple_PSI_System_Security_Protocol_and_Analysis.pdf"},{"key":"e_1_3_3_14_2","article-title":"2016 Report","author":"Boston Women\u2019s Workforce Council (BWWC).","year":"2017","unstructured":"Boston Women\u2019s Workforce Council (BWWC). 2017. 2016 Report. Retrieved from https:\/\/htv-prod-media.s3.amazonaws.com\/files\/bwwc-report-final-january-4-2017-1483635889.pdf","journal-title":"https:\/\/htv-prod-media.s3.amazonaws.com\/files\/bwwc-report-final-january-4-2017-1483635889.pdf"},{"key":"e_1_3_3_15_2","article-title":"2017 Report","author":"Boston Women\u2019s Workforce Council (BWWC).","year":"2018","unstructured":"Boston Women\u2019s Workforce Council (BWWC). 2018. 2017 Report. Retrieved from https:\/\/www.boston.gov\/sites\/default\/files\/document-file-01-2018\/bwwc_2017_report.pdf","journal-title":"https:\/\/www.boston.gov\/sites\/default\/files\/document-file-01-2018\/bwwc_2017_report.pdf"},{"key":"e_1_3_3_16_2","first-page":"696","volume-title":"IEEE International Conference on Data Engineering","author":"Bu S.","year":"2006","unstructured":"S. Bu, L. Lakshmanan, R. Ng, and G. Ramesh. 2006. Preservation of patterns and input-output privacy. In IEEE International Conference on Data Engineering. 696\u2013705."},{"key":"e_1_3_3_17_2","volume-title":"International Conference on Special Functions Applications (SSFA\u201907)","author":"Caiado C.","year":"2007","unstructured":"C. Caiado and P. Rathie. 2007. Polynomial coefficients and distribution of the sum of discrete uniform variables. In International Conference on Special Functions Applications (SSFA\u201907)."},{"issue":"1","key":"e_1_3_3_18_2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.5964\/meth.7321","article-title":"The a priori procedure for estimating the mean in both log-normal and gamma populations and robustness for assumption violations","volume":"18","author":"Cao L.","year":"2022","unstructured":"L. Cao, T. Tong, D. Trafimow, T. Wang, and X. Chen. 2022. The a priori procedure for estimating the mean in both log-normal and gamma populations and robustness for assumption violations. Methodology 18, 1 (2022), 24\u201343.","journal-title":"Methodology"},{"doi-asserted-by":"publisher","key":"e_1_3_3_19_2","DOI":"10.1109\/TIT.2019.2900716"},{"doi-asserted-by":"publisher","key":"e_1_3_3_20_2","DOI":"10.1016\/S1571-0661(04)00290-7"},{"doi-asserted-by":"publisher","key":"e_1_3_3_21_2","DOI":"10.1007\/88-470-0389-X_1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_22_2","DOI":"10.1007\/s11222-006-8175-8"},{"key":"e_1_3_3_23_2","volume-title":"Elements of Information Theory","author":"Cover T.","year":"2006","unstructured":"T. Cover and J. Thomas. 2006. Elements of Information Theory. Wiley-Interscience."},{"key":"e_1_3_3_24_2","volume-title":"Cryptography and Data Security","author":"Denning D.","year":"1982","unstructured":"D. Denning. 1982. Cryptography and Data Security. Addison-Wesley, Reading, MA."},{"doi-asserted-by":"publisher","key":"e_1_3_3_25_2","DOI":"10.1111\/j.1937-5956.2010.01188.x"},{"key":"e_1_3_3_26_2","article-title":"Secure Collaborative Planning, Forecasting and Replenishment (SCPFR)","author":"Deshpande V.","year":"2005","unstructured":"V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, K. Frikken, and J. Li. 2005. Secure Collaborative Planning, Forecasting and Replenishment (SCPFR). Technical Report. CERIAS Tech Report 2006-65.","journal-title":"Technical Report. CERIAS Tech Report 2006-65"},{"key":"e_1_3_3_27_2","first-page":"165","volume-title":"Multi-Echelon\/Public Applications of Supply Chain Management Conference","author":"Deshpande V.","year":"2006","unstructured":"V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, K. Frikken, and J. Li. 2006. Secure collaborative planning, forecasting and replenishment (SCPFR). In Multi-Echelon\/Public Applications of Supply Chain Management Conference. 165\u2013180."},{"doi-asserted-by":"publisher","key":"e_1_3_3_28_2","DOI":"10.5555\/1791834.1791836"},{"doi-asserted-by":"publisher","key":"e_1_3_3_29_2","DOI":"10.1007\/11681878_14"},{"doi-asserted-by":"publisher","key":"e_1_3_3_30_2","DOI":"10.1561\/0400000042"},{"doi-asserted-by":"publisher","key":"e_1_3_3_31_2","DOI":"10.1137\/1030059"},{"doi-asserted-by":"publisher","key":"e_1_3_3_32_2","DOI":"10.1109\/TCOM.1960.1097606"},{"key":"e_1_3_3_33_2","volume-title":"Advances in Neural Information Processing Systems","author":"Gao W.","year":"2017","unstructured":"W. Gao, S. Kannan, S. Oh, and P. Viswanath. 2017. Estimating mutual information for discrete-continuous mixtures. In Advances in Neural Information Processing Systems, Vol. 30. Curran Associates Inc."},{"doi-asserted-by":"publisher","key":"e_1_3_3_34_2","DOI":"10.1109\/TIT.2018.2807481"},{"key":"e_1_3_3_35_2","first-page":"351","volume-title":"ACM Symposium on Theory of Computing","author":"Ghosh A.","year":"2009","unstructured":"A. Ghosh, T. Roughgarden, and M. Sundararajan. 2009. Universally utility-maximizing privacy mechanisms. In ACM Symposium on Theory of Computing. 351\u2013360."},{"key":"e_1_3_3_36_2","first-page":"398","volume-title":"IEEE Computer Security Foundations Symposium","author":"Hsu J.","year":"2014","unstructured":"J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan, B. C. Pierce, and A. Roth. 2014. Differential privacy: An economic method for choosing epsilon. In IEEE Computer Security Foundations Symposium. IEEE, 398\u2013410."},{"unstructured":"Inpher. 2024. Inpher. Retrieved from https:\/\/inpher.io\/","key":"e_1_3_3_37_2"},{"key":"e_1_3_3_38_2","first-page":"370","volume-title":"IEEE European Symposium on Security and Privacy (EuroS&P\u201920)","author":"Ion M.","year":"2020","unstructured":"M. Ion, B. Kreuter, A. Nergiz, S. Patel, S. Saxena, K. Seth, M. Raykova, D. Shanahan, and M. Yung. 2020. On deploying secure computing: Private intersection-sum-with-cardinality. In IEEE European Symposium on Security and Privacy (EuroS&P\u201920). 370\u2013389."},{"key":"e_1_3_3_39_2","first-page":"103","volume-title":"International Conference on Information Theoretic Security","author":"Iwamoto M.","year":"2013","unstructured":"M. Iwamoto and J. Shikata. 2013. Information theoretic security for encryption based on conditional R\u00e9nyi entropies. In International Conference on Information Theoretic Security. 103\u2013121."},{"doi-asserted-by":"publisher","key":"e_1_3_3_40_2","DOI":"10.5555\/1971852.1971853"},{"doi-asserted-by":"publisher","key":"e_1_3_3_41_2","DOI":"10.1007\/s13748-017-0114-8"},{"key":"e_1_3_3_42_2","article-title":"Secure Multiparty Computation at Google","author":"Kreuter B.","year":"2017","unstructured":"B. Kreuter. 2017. Secure Multiparty Computation at Google. Real World Crypto. Retrieved from https:\/\/www.youtube.com\/watch?v=ee7oRsDnNNc","journal-title":"Real World Crypto"},{"key":"e_1_3_3_43_2","first-page":"48:1\u201348:5","volume-title":"ACM COMPASS Conference","author":"Lapets A.","year":"2018","unstructured":"A. Lapets, F. Jansen, K. Albab, R. Issa, L. Qin, M. Varia, and A. Bestavros. 2018. Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities. In ACM COMPASS Conference. 48:1\u201348:5."},{"key":"e_1_3_3_44_2","first-page":"73","volume-title":"IEEE Secure Development Conference (SecDev\u201916)","author":"Lapets A.","year":"2016","unstructured":"A. Lapets, N. Volgushev, A. Bestavros, F. Jansen, and M. Varia. 2016. Secure MPC for analytics as a web application. In IEEE Secure Development Conference (SecDev\u201916). 73\u201374."},{"key":"e_1_3_3_45_2","volume-title":"Secure Multi-party Computation for Analytics Deployed as a Lightweight Web Application","author":"Lapets A.","year":"2016","unstructured":"A. Lapets, N. Volgushev, A. Bestavros, F. Jansen, and M. Varia. 2016. Secure Multi-party Computation for Analytics Deployed as a Lightweight Web Application. Technical Report BUCS-TR-2016-008. Boston University."},{"key":"e_1_3_3_46_2","article-title":"Secure and Private Collaboration for Blockchains and Beyond","author":"Ligero Inc.","year":"2022","unstructured":"Ligero Inc. 2022. Secure and Private Collaboration for Blockchains and Beyond. Retrieved from https:\/\/ligero-inc.com\/","journal-title":"https:\/\/ligero-inc.com\/"},{"doi-asserted-by":"publisher","key":"e_1_3_3_47_2","DOI":"10.1109\/TKDE.2018.2845388"},{"doi-asserted-by":"publisher","key":"e_1_3_3_48_2","DOI":"10.1145\/2336717.2336719"},{"doi-asserted-by":"publisher","key":"e_1_3_3_49_2","DOI":"10.1109\/ISIT.1994.394764"},{"key":"e_1_3_3_50_2","first-page":"94","volume-title":"IEEE Symposium on Foundations of Computer Science","author":"McSherry F.","year":"2007","unstructured":"F. McSherry and K. Talwar. 2007. Mechanism design via differential privacy. In IEEE Symposium on Foundations of Computer Science. 94\u2013103."},{"doi-asserted-by":"publisher","key":"e_1_3_3_51_2","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"e_1_3_3_52_2","first-page":"583","volume-title":"IEEE Annual International Computer Software and Applications Conference (COMPSAC\u201916)","volume":"2","author":"Monreale A.","year":"2016","unstructured":"A. Monreale and W. Wang. 2016. Privacy-preserving outsourcing of data mining. In IEEE Annual International Computer Software and Applications Conference (COMPSAC\u201916), Vol. 2. 583\u2013588."},{"key":"e_1_3_3_53_2","volume-title":"Guidelines for Evaluating Differential Privacy Guarantees","author":"Near J. P.","year":"2023","unstructured":"J. P. Near, D. Darais, N. Lefkovitz, and G. Howarth. 2023. Guidelines for Evaluating Differential Privacy Guarantees. Technical Report BUCS-TR-2016-008. NIST."},{"unstructured":"Nth party. 2024. Nth party. Retrieved from https:\/\/www.nthparty.com\/","key":"e_1_3_3_54_2"},{"unstructured":"Partisia. 2024. Partisia. Retrieved from https:\/\/partisia.com\/","key":"e_1_3_3_55_2"},{"key":"e_1_3_3_56_2","first-page":"3","volume-title":"SIGPLAN Workshop on Programming Languages and Analysis for Security","author":"Rastogi A.","year":"2013","unstructured":"A. Rastogi, P. Mardziel, M. Hicks, and M. Hammer. 2013. Knowledge inference for optimizing secure multi-party computation. In SIGPLAN Workshop on Programming Languages and Analysis for Security. 3\u201314."},{"doi-asserted-by":"publisher","key":"e_1_3_3_57_2","DOI":"10.1002\/j.1538-7305.1982.tb04353.x"},{"key":"e_1_3_3_58_2","first-page":"1","volume-title":"IEEE Global Communications Conference (GLOBECOM\u201909)","author":"Senaratne D.","year":"2009","unstructured":"D. Senaratne and C. Tellambura. 2009. Numerical computation of the lognormal sum distribution. In IEEE Global Communications Conference (GLOBECOM\u201909). 1\u20136."},{"key":"e_1_3_3_59_2","first-page":"3","volume-title":"IEEE Symposium on Security and Privacy (S&P\u201917)","author":"Shokri R.","year":"2017","unstructured":"R. Shokri, M. Stronati, C. Song, and V. Shmatikov. 2017. Membership inference attacks against machine learning models. In IEEE Symposium on Security and Privacy (S&P\u201917). 3\u201318."},{"key":"e_1_3_3_60_2","first-page":"1122","volume-title":"IEEE International Symposium on Information Theory","author":"Sk\u00f3rski M.","year":"2019","unstructured":"M. Sk\u00f3rski. 2019. Strong chain rules for min-entropy under few bits spoiled. In IEEE International Symposium on Information Theory. 1122\u20131126."},{"key":"e_1_3_3_61_2","first-page":"288","volume-title":"International Conference on Foundations of Software Science and Computation Structures (FoSSaCS\u201909)","author":"Smith G.","year":"2009","unstructured":"G. Smith. 2009. On the foundations of quantitative information flow. In International Conference on Foundations of Software Science and Computation Structures (FoSSaCS\u201909). 288\u2013302."},{"key":"e_1_3_3_62_2","first-page":"2615","volume-title":"USENIX Security Symposium","author":"Song L.","year":"2021","unstructured":"L. Song and P. Mittal. 2021. Systematic evaluation of privacy risks of machine learning models. In USENIX Security Symposium. 2615\u20132632."},{"key":"e_1_3_3_63_2","first-page":"Springer, 343\u20133","volume-title":"Empirical Science of Financial Fluctuations","author":"Souma W.","year":"2002","unstructured":"W. Souma. 2002. Physics of personal income. In Empirical Science of Financial Fluctuations. Springer, 343\u2013352."},{"key":"e_1_3_3_64_2","article-title":"Helping organizations do more without collecting more data","author":"Walker A.","year":"2019","unstructured":"A. Walker, S. Patel, and M. Yung. 2019. Helping organizations do more without collecting more data. Google Security Blog (June2019). Retrieved from DOI:https:\/\/security.googleblog.com\/2019\/06\/helping-organizations-do-more-without-collecting-more-data.html","journal-title":"Google Security Blog"},{"doi-asserted-by":"publisher","key":"e_1_3_3_65_2","DOI":"10.1145\/1929934.1929935"},{"key":"e_1_3_3_66_2","first-page":"3413","volume-title":"IEEE Global Communications Conference (GLOBECOM\u201905)","author":"Wu J.","year":"2005","unstructured":"J. Wu, N. Mehta, and J. Zhang. 2005. Flexible lognormal sum approximation method. In IEEE Global Communications Conference (GLOBECOM\u201905). 3413\u20133417."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3705004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:02Z","timestamp":1750295882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,14]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2,28]]}},"alternative-id":["10.1145\/3705004"],"URL":"https:\/\/doi.org\/10.1145\/3705004","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2024,12,14]]},"assertion":[{"value":"2024-04-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}