Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-28914-9_18guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Lower bounds in differential privacy

Published: 19 March 2012 Publication History

Abstract

This paper is about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise to the answers, releasing only these noisy responses. A line of study initiated in [7] examines the amount of distortion needed to prevent privacy violations of various kinds. The results in the literature vary according to several parameters, including the size of the database, the size of the universe from which data elements are drawn, the "amount" of privacy desired, and for the purposes of the current work, the arity of the query. In this paper we sharpen and unify these bounds. Our foremost result combines the techniques of Hardt and Talwar [11] and McGregor et al. [13] to obtain linear lower bounds on distortion when providing differential privacy for a (contrived) class of low-sensitivity queries. (A query has low sensitivity if the data of a single individual has small effect on the answer.) Several structural results follow as immediate corollaries:
— We separate so-called counting queries from arbitrary low-sensitivity queries, proving the latter requires more noise, or distortion, than does the former;
— We separate (ε,0)-differential privacy from its well-studied relaxation (ε,δ)-differential privacy, even when δ∈2o(n) is negligible in the size n of the database, proving the latter requires less distortion than the former;
— We demonstrate that (ε,δ)-differential privacy is much weaker than (ε,0)-differential privacy in terms of mutual information of the transcript of the mechanism with the database, even when δ∈2o(n) is negligible in the size n of the database.
We also simplify the lower bounds on noise for counting queries in [11] and also make them unconditional. Further, we use a characterization of (ε,δ) differential privacy from [13] to obtain lower bounds on the distortion needed to ensure (ε,δ)-differential privacy for ε,δ>0. We next revisit the LP decoding argument of [10] and combine it with a recent result of Rudelson [15] to improve on a result of Kasiviswanathan et al. [12] on noise lower bounds for privately releasing ℓ-way marginals.

References

[1]
Bar-Yossef, Z., Jayram, T. S., Kumar, R., Sivakumar, D.: An information statistics approach to data stream and communication complexity. Journal of Computer and System Sciences 68(4), 702-732 (2004)
[2]
Barak, B., Braverman, M., Chen, X., Rao, A.: How to compress interactive communication. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 67-76 (2010)
[3]
Blum, A., Ligett, K., Roth, A.: A learning theory approach to noninteractive database privacy. In: Proceedings of the 40th ACM Symposium on Theory of Computing, pp. 609-618 (2008)
[4]
Candès, E. J., Rudelson, M., Tao, T., Vershynin, R.: Error Correction via Linear Programming. In: Proceedings of the 46th IEEE Symposium on Foundations of Computer Science, pp. 295-308 (2005)
[5]
De, A.: Lower bounds in Differential Privacy, arXiv:1107.2183v1 (2011)
[6]
De, A., Vadhan, S.: Personal Communication (2010)
[7]
Dinur, I., Nissim, K.: Revealing information while preserving privacy. Principles of Database Systems, 202-210 (2003)
[8]
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy Via Distributed Noise Generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486-503. Springer, Heidelberg (2006)
[9]
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
[10]
Dwork, C., McSherry, F., Talwar, K.: The price of privacy and the limits of LP decoding. In: Proceedings of the 39th ACM Symposium on Theory of Computing, pp. 85-94 (2007)
[11]
Hardt, M., Talwar, K.: On the geometry of differential privacy. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 705-714 (2010)
[12]
Kasiviswanathan, S. P., Rudelson, M., Smith, A., Ullman, J.: The Price of privately releasing Contingency tables and the spectra of random matrices with correlated rows. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 775-784 (2010)
[13]
McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., Vadhan, S. P.: The Limits of Two-Party Differential Privacy. In: Proceedings of the 51st IEEE Symposium on Foundations of Computer Science, pp. 81-90 (2010)
[14]
Erd?os, P., Frankl, P., Füredi, Z.: Families of finite sets in which no set is covered by the union of r others. Israel Journal of Mathematics 51(1,2), 79-89 (1985)
[15]
Rudelson, M.: Row products of random matrices, arXiv:1102.1947 (2011)

Cited By

View all
  • (2023)Information-Theoretic Approaches to Differential PrivacyACM Computing Surveys10.1145/360490456:3(1-18)Online publication date: 6-Oct-2023
  • (2023)Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep LearningProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623142(2636-2650)Online publication date: 15-Nov-2023
  • (2022)Privacy induces robustnessProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3600765(6829-6842)Online publication date: 28-Nov-2022
  • Show More Cited By

Index Terms

  1. Lower bounds in differential privacy

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    TCC'12: Proceedings of the 9th international conference on Theory of Cryptography
    March 2012
    654 pages
    ISBN:9783642289132
    • Editor:
    • Ronald Cramer

    Sponsors

    • IACR: International Association for Cryptologic Research

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 19 March 2012

    Author Tags

    1. LP decoding
    2. differential privacy

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Information-Theoretic Approaches to Differential PrivacyACM Computing Surveys10.1145/360490456:3(1-18)Online publication date: 6-Oct-2023
    • (2023)Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep LearningProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623142(2636-2650)Online publication date: 15-Nov-2023
    • (2022)Privacy induces robustnessProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3600765(6829-6842)Online publication date: 28-Nov-2022
    • (2016)Differential Privacy as a Mutual Information ConstraintProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978308(43-54)Online publication date: 24-Oct-2016
    • (2016)Space Lower Bounds for Itemset Frequency SketchesProceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems10.1145/2902251.2902278(441-454)Online publication date: 15-Jun-2016
    • (2016)Concentrated Differential PrivacyProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_24(635-658)Online publication date: 31-Oct-2016
    • (2015)Optimizing Batch Linear Queries under Exact and Approximate Differential PrivacyACM Transactions on Database Systems (TODS)10.1145/269950140:2(1-47)Online publication date: 30-Jun-2015
    • (2014)Fingerprinting codes and the price of approximate differential privacyProceedings of the forty-sixth annual ACM symposium on Theory of computing10.1145/2591796.2591877(1-10)Online publication date: 31-May-2014
    • (2014)Redrawing the boundaries on purchasing data from privacy-sensitive individualsProceedings of the 5th conference on Innovations in theoretical computer science10.1145/2554797.2554835(411-422)Online publication date: 12-Jan-2014
    • (2014)Mechanism design in large gamesProceedings of the 5th conference on Innovations in theoretical computer science10.1145/2554797.2554834(403-410)Online publication date: 12-Jan-2014
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media