Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessIs Scale AI Stock Public in 2026? Price, Symbol & Alternatives - Bullish BearsGoogle News - Scale AI dataHow to Choose Your MVP Tech StackDEV CommunityDocument Workflow Automation: An Architectural Guide to Building API-Driven Document PipelinesDEV CommunityHow to Roll Back a Failed Deployment in 30 SecondsDEV CommunityWho's hiring — April 2026DEV CommunityScraped 300 pages successfully. Site updated robots.txt at page 187 and blocked me.DEV CommunityI built an npm malware scanner in Rust because npm audit isn't enoughDEV CommunityMCP App CSP Explained: Why Your Widget Won't RenderDEV CommunityVS-wet dreigt ASML-export van immersiemachines naar China af te knijpenTweakers.netBuilt a script to categorize expenses automatically. Saved 3 hours/month.DEV CommunityFrom MLOps to LLMOps: A Practical AWS GenAI Operations GuideDEV CommunityCleaned 10k customer records. One emoji crashed my entire pipeline.DEV CommunityBlack Hat USADark ReadingBlack Hat AsiaAI BusinessIs Scale AI Stock Public in 2026? Price, Symbol & Alternatives - Bullish BearsGoogle News - Scale AI dataHow to Choose Your MVP Tech StackDEV CommunityDocument Workflow Automation: An Architectural Guide to Building API-Driven Document PipelinesDEV CommunityHow to Roll Back a Failed Deployment in 30 SecondsDEV CommunityWho's hiring — April 2026DEV CommunityScraped 300 pages successfully. Site updated robots.txt at page 187 and blocked me.DEV CommunityI built an npm malware scanner in Rust because npm audit isn't enoughDEV CommunityMCP App CSP Explained: Why Your Widget Won't RenderDEV CommunityVS-wet dreigt ASML-export van immersiemachines naar China af te knijpenTweakers.netBuilt a script to categorize expenses automatically. Saved 3 hours/month.DEV CommunityFrom MLOps to LLMOps: A Practical AWS GenAI Operations GuideDEV CommunityCleaned 10k customer records. One emoji crashed my entire pipeline.DEV Community
AI NEWS HUBbyEIGENVECTOREigenvector

Local Node Differential Privacy

arXiv cs.DSby Sofya Raskhodnikova, Adam Smith, Connor Wagaman, Anatoly ZavyalovApril 3, 20262 min read0 views
Source Quiz

arXiv:2602.15802v2 Announce Type: replace Abstract: We initiate an investigation of node differential privacy for graphs in the local model of private data analysis. In our model, dubbed LNDP*, each node sees its own edge list and releases the output of a local randomizer on this input. These outputs are aggregated by an untrusted server to obtain a final output. We develop a novel algorithmic framework for this setting that allows us to accurately answer arbitrary linear queries about the input graph's degree distribution. Our framework is based on a new object, called the blurry degree distribution, which closely approximates the degree distribution and has lower sensitivity. Instead of answering queries about the degree distribution directly, our algorithms answer queries about the blur

View PDF

Abstract:We initiate an investigation of node differential privacy for graphs in the local model of private data analysis. In our model, dubbed LNDP*, each node sees its own edge list and releases the output of a local randomizer on this input. These outputs are aggregated by an untrusted server to obtain a final output. We develop a novel algorithmic framework for this setting that allows us to accurately answer arbitrary linear queries about the input graph's degree distribution. Our framework is based on a new object, called the blurry degree distribution, which closely approximates the degree distribution and has lower sensitivity. Instead of answering queries about the degree distribution directly, our algorithms answer queries about the blurry degree distribution. This framework yields accurate LNDP* algorithms for the edge count, PMF and CDF of the degree distribution, and other graph statistics. For some natural problems, our algorithms match the accuracy achievable with node privacy in the central model, where data are held and processed by a trusted server. We also prove lower bounds on the error required by LNDP* algorithms that imply the optimality of our framework for edge counting in sparse graphs and Erdos-Renyi parameter estimation. Our lower bounds apply even to interactive protocols with a constant number of rounds of interaction between the nodes and the server. Existing lower-bound techniques for related models either yield loose bounds or do not apply in our setting, as graph data results in inherently overlapping inputs to local randomizers. To prove our bounds, we develop a splicing argument that stitches together views from locally similar but globally different distributions on graphs to obtain hard instances. Finally, we prove structural results that reveal qualitative differences between local node privacy and the standard local model for tabular data.*

Subjects:

Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)

Cite as: arXiv:2602.15802 [cs.DS]

(or arXiv:2602.15802v2 [cs.DS] for this version)

https://doi.org/10.48550/arXiv.2602.15802

arXiv-issued DOI via DataCite

Submission history

From: Connor Wagaman [view email] [v1] Tue, 17 Feb 2026 18:41:48 UTC (93 KB) [v2] Wed, 1 Apr 2026 23:51:13 UTC (93 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

modelreleaseannounce

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Local Node …modelreleaseannounceanalysisglobalarxivarXiv cs.DS

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 139 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Releases