Data Reconstruction: When You See It and When You Don’t

Edith Cohen, Haim Kaplan, Yishay Mansour, Shay Moran, Kobbi Nissim, Uri Stemmer, Eliad Tsfadia

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We revisit the fundamental question of formally defining what constitutes a reconstruction attack. While often clear from the context, our exploration reveals that a precise definition is much more nuanced than it appears, to the extent that a single all-encompassing definition may not exist. Thus, we employ a different strategy and aim to “sandwich” the concept of reconstruction attacks by addressing two complementing questions: (i) What conditions guarantee that a given system is protected against such attacks? (ii) Under what circumstances does a given attack clearly indicate that a system is not protected? More specifically, We introduce a new definitional paradigm – Narcissus Resiliency – to formulate a security definition for protection against reconstruction attacks. This paradigm has a self-referential nature that enables it to circumvent shortcomings of previously studied notions of security. Furthermore, as a side-effect, we demonstrate that Narcissus resiliency captures as special cases multiple well-studied concepts including differential privacy and other security notions of one-way functions and encryption schemes. We formulate a link between reconstruction attacks and Kolmogorov complexity. This allows us to put forward a criterion for evaluating when such attacks are convincingly successful.

Original languageEnglish
Title of host publication16th Innovations in Theoretical Computer Science Conference, ITCS 2025
EditorsRaghu Meka
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959773614
DOIs
StatePublished - 11 Feb 2025
Event16th Innovations in Theoretical Computer Science Conference, ITCS 2025 - New York, United States
Duration: 7 Jan 202510 Jan 2025

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume325

Conference

Conference16th Innovations in Theoretical Computer Science Conference, ITCS 2025
Country/TerritoryUnited States
CityNew York
Period7/01/2510/01/25

Keywords

  • differential privacy
  • reconstruction

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'Data Reconstruction: When You See It and When You Don’t'. Together they form a unique fingerprint.

Cite this