Acyclic Graph Pattern Counting under Local Differential Privacy
arXiv SecurityArchived Mar 23, 2026✓ Full text saved
arXiv:2603.19671v1 Announce Type: cross Abstract: Graph pattern counting serves as a cornerstone of network analysis with extensive real-world applications. Its integration with local differential privacy (LDP) has gained growing attention for protecting sensitive graph information in decentralized settings. However, existing LDP frameworks are largely ad hoc, offering solutions only for specific patterns such as triangles and stars. A general mechanism for counting arbitrary graph patterns, eve
Full text archived locally
✦ AI Summary· Claude Sonnet
Computer Science > Databases
[Submitted on 20 Mar 2026]
Acyclic Graph Pattern Counting under Local Differential Privacy
Yihua Hu, Kuncan Wang, Wei Dong
Graph pattern counting serves as a cornerstone of network analysis with extensive real-world applications. Its integration with local differential privacy (LDP) has gained growing attention for protecting sensitive graph information in decentralized settings. However, existing LDP frameworks are largely ad hoc, offering solutions only for specific patterns such as triangles and stars. A general mechanism for counting arbitrary graph patterns, even for the subclass of acyclic patterns, has remained an open problem. To fill this gap, we present the first general solution for counting arbitrary acyclic patterns under LDP. We identify and tackle two fundamental challenges: generalizing pattern construction from distributed data and eliminating node duplication during the construction. To address the first challenge, we propose an LDP-tailored recursive subpattern counting framework that incrementally builds patterns across multiple communication rounds. For the second challenge, we apply a random marking technique that restricts each node to a unique position in the pattern during computation. Our mechanism achieves strong utility guarantees: for any acyclic graph pattern with k edges, we achieve an additive error of \tilde{O}(\sqrt{N}d(G)^k), where N is the number of nodes and d(G) is the maximum degree of the input graph G. Experiments on real-world graph datasets across multiple types of acyclic patterns demonstrate that our mechanisms achieve up to 46-2600\times improvement in utility and 300-650\times reduction in communication cost compared to the baseline methods.
Comments: Accepted to SIGMOD 2026
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
Cite as: arXiv:2603.19671 [cs.DB]
(or arXiv:2603.19671v1 [cs.DB] for this version)
https://doi.org/10.48550/arXiv.2603.19671
Focus to learn more
Related DOI:
https://doi.org/10.1145/3802006
Focus to learn more
Submission history
From: Yihua Hu [view email]
[v1] Fri, 20 Mar 2026 06:12:12 UTC (781 KB)
Access Paper:
HTML (experimental)
view license
Current browse context:
cs.DB
< prev | next >
new | recent | 2026-03
Change to browse by:
cs
cs.CR
References & Citations
NASA ADS
Google Scholar
Semantic Scholar
Export BibTeX Citation
Bookmark
Bibliographic Tools
Bibliographic and Citation Tools
Bibliographic Explorer Toggle
Bibliographic Explorer (What is the Explorer?)
Connected Papers Toggle
Connected Papers (What is Connected Papers?)
Litmaps Toggle
Litmaps (What is Litmaps?)
scite.ai Toggle
scite Smart Citations (What are Smart Citations?)
Code, Data, Media
Demos
Related Papers
About arXivLabs
Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)