Home > Research . Search . Country . Browse . Small Grants

PSC In The News

RSS Feed icon

Work by Geronimus cited in PBS's '5 important stories'

Schoeni and Freedman summarize the good and bad news on dementia trends among older Americans

Geronimus offered an explanation for the black-white gap in maternal and infant health 25 years ago

More News

Highlights

U-M participants at 2018 PAA Annual Meeting

PDHP invites applications for Faculty Small Grants in support of population science

Needham, Hicken, Mitchell and colleagues link maternal social disadvantage and newborn telomere length

PSC launches new program to support population scientists across U-M

More Highlights

Next Brown Bag

Mon, May 7, 2018, noon: Student Forum on Educational Inequality

George C. Alter photo

Computing Statistics from Private Data

a PSC Research Project

Investigators:   George C. Alter, Kristine M. Witkowski, John E. Marcotte, Michael R. Elliott, Trivellore Raghunathan

This project will lay a foundation for the development of cryptographic tools from the field of secure Multiparty Computation (MPC) to perform joint statistical analyses across multiple private data sets, without the need to share the underlying data.
We plan two workshops that will bring together social scientists and statisticians experienced in working with administrative data with computer scientists and cryptographers who are experts in MPC. We will focus on three types of administrative data and identify requirements for an MPC system tailored to generate standard statistical analyses in a secure and efficient way. We will also discuss acceptable threat models and leakage levels. Previous work has found that leaking partial information (e.g. the size of data sets in an intermediate computation) allowed for significant flexibility in protocol design and ultimately led to large efficiency gains. Results of these workshops will be: (1) A list of the statistical procedures the MPC system will perform and the order in which they will be implemented during software development. (2) A security model and guidelines for acceptable leakage levels. (3) A short-list of the MPC protocols that are most likely to be efficient with our target data types. These outcomes will be incorporated in an NSF proposal to build and test an MPC system.

Funding Period: 01/01/2015 to 12/31/2016

Search . Browse