private two terminal hypothesis testing
play

Private Two-Terminal Hypothesis Testing Varun Narayanan TIFR, - PowerPoint PPT Presentation

Private Two-Terminal Hypothesis Testing Varun Narayanan TIFR, Mumbai Joint work with Manoj Mishra (NISER, Bhubaneswar), Vinod Prabhakaran (TIFR, Mumbai) ISIT 2020 Two-Terminal Hypothesis Testing X Y Alice Bob H A H B H = 0 : ( X ,


  1. Private Two-Terminal Hypothesis Testing Varun Narayanan TIFR, Mumbai Joint work with Manoj Mishra (NISER, Bhubaneswar), Vinod Prabhakaran (TIFR, Mumbai) ISIT 2020

  2. Two-Terminal Hypothesis Testing X Y Alice Bob ˆ ˆ H A H B H = 0 : ( X , Y ) ∼ P 0 XY H = 1 : ( X , Y ) ∼ P 1 XY

  3. Two-Terminal Hypothesis Testing X Y Alice Bob ˆ ˆ H A H B H = 0 : ( X , Y ) ∼ P 0 XY H = 1 : ( X , Y ) ∼ P 1 XY

  4. Privacy Motivated by the notion of security in multi-party function computation from cryptography Privacy is against an honest-but-curious user Emulates an ideal setting where users learn only their inputs and true hypothesis

  5. y x H = 0 Alice Bob

  6. y x H = 0 Alice Bob Ideal Setting Alice learns Input : x True hypothesis : H = 0 Alice’s knowledge of Bob’s input p( y | X = x , H = 0)

  7. y x H = 0 Alice Bob Ideal Setting Real Setting Alice learns Alice learns Input : x Input : x True hypothesis : H = 0 True hypothesis : H = 0 Alice’s ‘view’ : V A = v A Alice’s knowledge of Bob’s input Alice’s knowledge... p( y | X = x , H = 0 , V A = v A ) p( y | X = x , H = 0)

  8. y x H = 0 Alice Bob Ideal Setting Real Setting Alice learns Alice learns Input : x Input : x True hypothesis : H = 0 True hypothesis : H = 0 Alice’s ‘view’ : V A = v A Alice’s knowledge of Bob’s input Alice’s knowledge... p( y | X = x , H = 0 , V A = v A ) p( y | X = x , H = 0) δ -privacy against Alice: �� � � � p( y | x , H = 0 , V A ) − p( y | x , H = 0) � Pr TV ≥ δ � x , H = 0 ≤ δ � �

  9. ( ǫ, δ )-Private Two-Terminal Hypothesis Testing X Y Alice Bob ˆ ˆ H A H B

  10. ( ǫ, δ )-Private Two-Terminal Hypothesis Testing X Y Alice Bob ˆ ˆ H A H B ǫ -Correctness @Alice: For θ ∈ { 0 , 1 } , � � ˆ Pr H A � = θ | H = θ ≤ ǫ δ -Privacy @Alice: For θ ∈ { 0 , 1 } and all x such that P θ X ( x ) > 0, �� � � � p( y | x , H = θ, V A ) − p( y | x , H = θ ) � Pr TV ≥ δ � x , H = θ ≤ δ � �

  11. Related Work Hypothesis testing: Pearson, 1900; Fisher, 1925; Neyman and Pearson, 1933 Multi-terminal hypothesis testing: Ahlswede and Csizar, 1986; Han, 1987; Tsitsiklis, 1993; Han and Amari, 1998 Recently: Xiang and Kim, ‘12, ‘13; Rahman and Wagner, ‘12; Zhang et. al. , ‘13; Sreekumar and Gunduz, ‘17; Salehkalaibar et. al., ‘18; Han et. al., ‘18; Diakonikolas et. al., ‘19 Privacy in multi-terminal detection: Duchi et. al. , ‘13; Sheffet, ‘18; Acharya et. al. , ‘19 Privacy in two-terminal detection: Sreekumar et. al., ‘18; Andoni et. al., ‘18; Gilani et. al, ‘19

  12. Can we drive both correctness and privacy error to zero simultaneously using more and more samples?

  13. Theorem 1 ( 1 12 , 1 12 )-private multi-terminal independence testing is impossible using private/common randomness and error-free communication

  14. Theorem 1 ( 1 12 , 1 12 )-private multi-terminal independence testing is impossible using private/common randomness and error-free communication X Y Alice Bob ˆ ˆ H A H B H = 0 : X = Y | H = 1 : X = Y

  15. Theorem 1 ( 1 12 , 1 12 )-private multi-terminal independence testing is impossible using private/common randomness and error-free communication X Y Alice Bob ˆ ˆ H A H B H = 0 : X = Y | H = 1 : X = Y Private Distributed Independence Testing = ⇒ Statistically secure computation of AND (impossible)

  16. Using Correlations... ( R , S ) ∼ Φ X Y R S Alice Bob ( R , S ) ( X , Y ) = | ˆ ˆ H A H B When Φ is any non-trivial correlation*, Correctness and privacy error can be made arbitrarily small using more and more samples In fact, we characterize the optimal correctness-privacy error exponent [*] correlations that do not ‘seperate’ into common and private components

  17. Correctness-Privacy Error Exponent A sequence of ( n , ǫ n , δ n )-private hypothesis testing protocols 1 achieve correctness-privacy error exponent ( α, β ) if: n →∞ − 1 n →∞ − 1 lim sup n log ǫ n ≥ α and lim sup n log δ n ≥ β 1 ( n , ǫ n , δ n )-private protocol uses n samples, and is ( ǫ, δ )-private

  18. Correctness-Privacy Error Exponent A sequence of ( n , ǫ n , δ n )-private hypothesis testing protocols 1 achieve correctness-privacy error exponent ( α, β ) if: n →∞ − 1 n →∞ − 1 lim sup n log ǫ n ≥ α and lim sup n log δ n ≥ β We characterize the correctness-privacy error exponent region of private testing 1 ( n , ǫ n , δ n )-private protocol uses n samples, and is ( ǫ, δ )-private

  19. Theorem 2 Private detection with correctness-privacy error exponent ( α, β ) is possible @Alice if and only if there exist no Q XY such that one of the following is satisfied: 1 D ( Q XY � P 0 XY ) ≤ α and D ( Q XY � P 1 XY ) ≤ α 2 D ( Q X � P θ X ) ≤ α and D ( Q Y | X � P θ Y | X ) ≤ β for θ = 0 , 1 XY ) ≤ α , D ( Q X � P 1 − θ 3 D ( Q XY � P θ ) ≤ α , and X D ( Q Y | X � P 1 − θ Y | X ) ≤ β for θ = 0 or 1

  20. Tradeoff between Privacy and Correctness β 0.7 0.6 0.5 0.4 0.3 0.2 0.1 α 0.1 0.2 0.3 0.4 0.5 0.6 H = 0 H = 1 X = 0 X = 1 X = 0 X = 1 1 1 2 Y = 0 Y = 0 0 3 3 3 1 1 Y = 1 0 Y = 1 0 3 3

  21. Overview of the Proof Reduce the problem to secure computation of decision function Find the optimal decision function

  22. Secure Multi-Party Computation (MPC) X Y ( R , S ) ∼ Φ R S Alice Bob ( R , S ) ( X , Y ) = | f A ( X , Y ) f B ( X , Y ) Privacy: Y ↔ ( X , f A ( X , Y )) ↔ View A X ↔ ( Y , f B ( X , Y )) ↔ View B Any functions can be computed securely using any non-trivial correlation Φ

  23. Simplyifying ( ǫ, δ )-Private Detection using MPC y x ( R , S ) ∼ Φ R S Alice Bob ( R , S ) ( X , Y ) = | f A ( x , y ) f B ( x , y ) �� � � � p( y | x , θ, V A ) − p( y | x , θ ) � Pr TV ≥ δ ≤ δ � x , θ � � ⇔ �� � � � Pr � p( y | x , θ, f A ( x , Y )) − p( y | x , θ ) TV ≥ δ ≤ δ � x , θ �

  24. Error exponent ( α, β ) is not achievable @Alice if: Scenario 1 P 0 P 1 XY XY α α Q XY ∃ Q XY : D ( Q XY � P 0 XY ) ≤ α and D ( Q XY � P 1 XY ) ≤ α

  25. Error exponent ( α, β ) is not achievable @Alice if: Scenario 2 Q XY Q X P 0 Q X P 1 Y | X Y | X β β P 0 P 1 XY XY α α D ( Q X � P θ X ) ≤ α and D ( Q Y | X � P θ Y | X ) ≤ α for θ = 0 , 1

  26. Error exponent ( α, β ) is not achievable @Alice if: Scenario 3 Q X P 1 Q XY Y | X β P 0 P 1 XY XY α α XY ) ≤ α , D ( Q X � P 1 − θ D ( Q XY � P θ ) ≤ α and X D ( Q Y | X � P 1 − θ Y | X ) ≤ α for θ = 0 or 1

  27. Optimal Decision Functions for Alice For sample size n , when the type of input ( x n , y n ) is Q XY : Q X P 1 Y | X Q X P 0 Y | X P 0 P 1 XY XY α α output H = 0

  28. Optimal Decision Functions for Alice For sample size n , when the type of input ( x n , y n ) is Q XY : Q XY Q X P 1 Y | X P 0 P 1 XY XY α α output H = 1

  29. Optimal Decision Functions for Alice For sample size n , when the type of input ( x n , y n ) is Q XY : Q X P 0 Q X P 1 Y | X Y | X P 0 P 1 XY XY α α output H = 0

  30. Optimal Decision Functions for Alice For sample size n , when the type of input ( x n , y n ) is Q XY : Q XY Q X P 0 Q X P 1 Y | X Y | X β P 0 P 1 XY XY α α output H = 0

  31. Optimal Decision Functions for Alice For sample size n , when the type of input ( x n , y n ) is Q XY : Q XY Q X P 0 Q X P 1 Y | X Y | X β P 0 P 1 XY XY α α output H = 1

  32. Conclusion An intuitive notion of privacy for distributed testing Generally impossible using only private/common randomness and noise free communication Feasible when users share non-trivial correlations (or channels with non-trivial noise) The correctness-privacy error exponent can be characterized

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend