Home > Research . Search . Country . Browse . Small Grants

PSC In The News

RSS Feed icon

Work by Geronimus cited in account of Serena Williams' maternal health complications

Alexander and Massey compare outcomes for children whose parents did and did not take part in Great Migration

Geronimus on pushing past early dismissal of her weathering hypothesis

More News

Highlights

Robert Wood Johnson Foundation health leadership development programs accepting applications

AA named 2018 Best Place to Live in America (out of 100 cities)

Remembering Jim Morgan, founding member of ISR and creator of the PSID

1/17/18: ISR screening and discussion of documentary "Class Divide" at Michigan Theater

More Highlights

Next Brown Bag

Mon, Jan 22, 2018, noon: Narayan Sastry

George C. Alter photo

Computing Statistics from Private Data

a PSC Research Project

Investigators:   George C. Alter, Kristine M. Witkowski, John E. Marcotte, Michael R. Elliott, Trivellore Raghunathan

This project will lay a foundation for the development of cryptographic tools from the field of secure Multiparty Computation (MPC) to perform joint statistical analyses across multiple private data sets, without the need to share the underlying data.
We plan two workshops that will bring together social scientists and statisticians experienced in working with administrative data with computer scientists and cryptographers who are experts in MPC. We will focus on three types of administrative data and identify requirements for an MPC system tailored to generate standard statistical analyses in a secure and efficient way. We will also discuss acceptable threat models and leakage levels. Previous work has found that leaking partial information (e.g. the size of data sets in an intermediate computation) allowed for significant flexibility in protocol design and ultimately led to large efficiency gains. Results of these workshops will be: (1) A list of the statistical procedures the MPC system will perform and the order in which they will be implemented during software development. (2) A security model and guidelines for acceptable leakage levels. (3) A short-list of the MPC protocols that are most likely to be efficient with our target data types. These outcomes will be incorporated in an NSF proposal to build and test an MPC system.

Funding Period: 01/01/2015 to 12/31/2016

Search . Browse