{"id":"https://openalex.org/W7125954324","doi":"https://doi.org/10.48550/arxiv.2601.19154","title":"Analysis of Shuffling Beyond Pure Local Differential Privacy","display_name":"Analysis of Shuffling Beyond Pure Local Differential Privacy","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125954324","doi":"https://doi.org/10.48550/arxiv.2601.19154"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2601.19154","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024469867","display_name":"Shun Takagi","orcid":"https://orcid.org/0000-0001-7732-2807"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Takagi, Shun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5048228893","display_name":"Seng Pei Liew","orcid":"https://orcid.org/0000-0003-2419-2505"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liew, Seng Pei","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024469867"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.004900000058114529,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.00139999995008111,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.9664999842643738},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8689000010490417},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.5120000243186951},{"id":"https://openalex.org/keywords/complement","display_name":"Complement (music)","score":0.4966999888420105},{"id":"https://openalex.org/keywords/divergence","display_name":"Divergence (linguistics)","score":0.4302000105381012},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3833000063896179},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3691999912261963},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.3508000075817108}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.9664999842643738},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8689000010490417},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.5120000243186951},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.4966999888420105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4862000048160553},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4366999864578247},{"id":"https://openalex.org/C207390915","wikidata":"https://www.wikidata.org/wiki/Q1230525","display_name":"Divergence (linguistics)","level":2,"score":0.4302000105381012},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3901999890804291},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3833000063896179},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3508000075817108},{"id":"https://openalex.org/C205147927","wikidata":"https://www.wikidata.org/wiki/Q752718","display_name":"Asymptotic analysis","level":2,"score":0.33570000529289246},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3163999915122986},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.28600001335144043},{"id":"https://openalex.org/C171752962","wikidata":"https://www.wikidata.org/wiki/Q255166","display_name":"Kullback\u2013Leibler divergence","level":2,"score":0.2815000116825104}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2601.19154","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2601.19154","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.19154","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2601.19154","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.6442156434059143,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Shuffling":[0],"is":[1,102,124],"a":[2,9,92,115,131,160,172,243],"powerful":[3],"way":[4],"to":[5,146],"amplify":[6],"privacy":[7,24,32,47,80,156,164],"of":[8,20,41,83,152],"local":[10,30,59,111,181],"randomizer":[11,182],"in":[12,240],"private":[13],"distributed":[14],"data":[15],"analysis.":[16],"Most":[17],"existing":[18],"analyses":[19],"how":[21],"shuffling":[22,69,134],"amplifies":[23],"are":[25],"based":[26],"on":[27,109,179],"the":[28,39,46,52,79,105,110,139,153,180,201,207,215,224],"pure":[29,58],"differential":[31],"(DP)":[33],"parameter":[34,118,128],"$\\varepsilon_0$.":[35,98],"This":[36],"paper":[37],"raises":[38],"question":[40],"whether":[42],"$\\varepsilon_0$":[43],"adequately":[44],"captures":[45],"amplification.":[48],"For":[49],"example,":[50],"since":[51],"Gaussian":[53,199],"mechanism":[54,112],"does":[55,65],"not":[56,204],"satisfy":[57,193],"DP":[60],"for":[61,133,162,197,222,247],"any":[62],"finite":[63,228],"$\\varepsilon_0$,":[64],"it":[66],"follow":[67],"that":[68,96,121],"yields":[70],"weak":[71],"amplification?":[72],"To":[73],"solve":[74],"this":[75,122,127,144,185,194],"problem,":[76],"we":[77,137,158,170,213],"revisit":[78],"blanket":[81,88,106,225],"bound":[82],"Balle":[84],"et":[85],"al.":[86],"(the":[87],"divergence)":[89],"and":[90,120,149,176,236],"develop":[91],"direct":[93],"asymptotic":[94,216],"analysis":[95,145,246],"bypasses":[97],"Our":[99],"key":[100],"finding":[101],"that,":[103],"asymptotically,":[104],"divergence":[107,226],"depends":[108],"only":[113],"through":[114,166],"single":[116],"scalar":[117],"$\u03c7$":[119],"dependence":[123],"monotonic.":[125],"Therefore,":[126],"serves":[129],"as":[130],"proxy":[132],"efficiency,":[135],"which":[136,184,230],"call":[138],"shuffle":[140,167,248],"index.":[141],"By":[142],"applying":[143],"both":[147],"upper":[148],"lower":[150],"bounds":[151],"shuffled":[154],"mechanism's":[155],"profile,":[157],"obtain":[159],"band":[161,186,209],"its":[163],"guarantee":[165],"indices.":[168],"Furthermore,":[169],"derive":[171],"simple":[173],"structural,":[174],"necessary":[175],"sufficient":[177],"condition":[178,202],"under":[183],"collapses":[187],"asymptotically.":[188],"$k$-RR":[189],"families":[190],"with":[191,218],"$k\\ge3$":[192],"condition,":[195],"while":[196],"generalized":[198],"mechanisms":[200],"may":[203],"hold":[205],"but":[206],"resulting":[208],"remains":[210],"tight.":[211],"Finally,":[212],"complement":[214],"theory":[217],"an":[219],"FFT-based":[220],"algorithm":[221],"computing":[223],"at":[227],"$n$,":[229,241],"offers":[231],"rigorously":[232],"controlled":[233],"relative":[234],"error":[235],"near-linear":[237],"running":[238],"time":[239],"providing":[242],"practical":[244],"numerical":[245],"DP.":[249]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-01-29T00:00:00"}
