Randomness in Computing L ECTURE 27 Last time Stationary - - PowerPoint PPT Presentation

โ–ถ
randomness in computing
SMART_READER_LITE
LIVE PREVIEW

Randomness in Computing L ECTURE 27 Last time Stationary - - PowerPoint PPT Presentation

Randomness in Computing L ECTURE 27 Last time Stationary distributions Random walks on graphs Algorithm for - -PATH Today Sublinear algorithms Differential privacy 4/29/2020 Sofya Raskhodnikova;Randomness in


slide-1
SLIDE 1

4/29/2020

Randomness in Computing

LECTURE 27

Last time

  • Stationary distributions
  • Random walks on graphs
  • Algorithm for ๐‘ก-๐‘ข-PATH

Today

  • Sublinear algorithms
  • Differential privacy

Sofya Raskhodnikova;Randomness in Computing; based on slides by Baranasuriya et al.

slide-2
SLIDE 2

A Sublinear-Time Algorithm

B L A - B L A - B L A - B L A - B L A - B L A - B L A - B L A

approximate answer

randomized algorithm

? L ? B ? L ? A

Quality of approximation Resources

  • number of queries
  • running time
slide-3
SLIDE 3

Goal: Fundamental Understanding

  • f Sublinear Computation
  • What computational tasks?
  • How to measure quality of approximation?
  • What type of access to the input?
  • Can we make our computations robust

(e.g., to noise or erased data)?

slide-4
SLIDE 4

Fundamental Computational Tasks

  • Property testing
  • need to answer YES or NO
  • intuition: only require correct answers on two sets of

instances that are very different from each other

  • Learning
  • need an approximate representation of an object
  • input is from a given class (or is close to it)
  • Classical approximation
  • need to compute a value
  • output should be close to the desired value

4

slide-5
SLIDE 5

[Rubinfeld Sudan, Goldreich Goldwasser Ron]

Property Testing: Definition

Property Tester

Close to YES

Far from YES

YES

Reject with probability 2/3 Donโ€™t care Accept with probability โ‰ฅ ๐Ÿ‘/๐Ÿ’

๏‚ณ

Randomized Algorithm

YES

Accept with probability โ‰ฅ ๐Ÿ‘/๐Ÿ’ Reject with probability 2/3

NO ๏‚ณ far = differs in many places ๐œ- (โ‰ฅ ๐œ fraction of places)

๐œ

slide-6
SLIDE 6

Example: Lipschitz Testing [Jha R]

6

Input: a list of ๐‘œ numbers ๐‘ฆ1, ๐‘ฆ2 , โ€ฆ , ๐‘ฆ๐‘œ

  • A list of numbers is Lipschitz if ๐‘ฆ๐‘—+1 โˆ’ ๐‘ฆ๐‘— โ‰ค 1 for all ๐‘—.
  • Question: Is the list Lipschitz?

Requires reading entire list: ๏—(๐‘œ) time

  • Approximate version: Is the list Lipschitz or ๐œ-far from Lipschitz?

(An ๐œ fraction of ๐‘ฆ๐‘— โ€™s have to be changed to make it Lipschitz.) Our result: O((log ๐‘œ)/๐œ) time

5 6 5 4 5 4 3 2 2 1

๐’‹

1 2 3

๐’š๐’‹

4 5 6 7 8 9 10 1 2 3 4 5 6

slide-7
SLIDE 7

Lipschitz Testing: Attempts

  • 1. Test: Pick a random ๐‘— and reject if ๐‘ฆ๐‘—+1 โˆ’ ๐‘ฆ๐‘— > 1

Fails on: โ† 1/2-far from Lipschitz

  • 2. Test: Pick random ๐‘— < ๐‘˜ and reject if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—

Fails on: โ† 1/2-far from Lipschitz

0 1 2 3 5 6 7 8 0 2 1 3 2 4 3 5 4 6

๐’‹ ๐’š๐’‹

1 2 3 4 5 6 1 2 3 4 5 6 7 8 9 10

๐’š๐’‹

3 4 5 6 2

๐’‹

1 1 2 3 4 5 6 7 8

slide-8
SLIDE 8

Is a list Lipschitz or ๐œ-far from Lipschitz?

Idea: Associate positions in the list with vertices of the directed line. Construct a graph (2-spanner)

  • by adding a few โ€œshortcutโ€ edges (๐‘—, ๐‘˜) for ๐‘— < ๐‘˜
  • where each pair of vertices is connected by a path of length at most 2

โ€ฆ โ€ฆ

โ‰ค ๐‘œ log ๐‘œ edges

1 2 3 โ€ฆ ๐’-1 ๐’

[Bhattacharyya Grigorescu Jung R Woodruff]

slide-9
SLIDE 9

Is a list Lipschitz or ๐œ-far from Lipschitz?

3 2 2 4 6 6 7

Analysis:

  • Call a pair (๐‘—, ๐‘˜) violated if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—, and satisfied otherwise.
  • If ๐‘— is an endpoint of a violated edge, call ๐‘ฆ๐‘— bad. Otherwise, call it good.

Proof: Consider any two good numbers, xi and xj. They are connected by a path of (at most) two satisfied edges ๐‘—, ๐‘™ , (๐‘™, ๐‘˜) โ‡’ ๐‘ฆ๐‘™ โˆ’ ๐‘ฆ๐‘— โ‰ค ๐‘™ โˆ’ ๐‘— and ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘™ โ‰ค ๐‘˜ โˆ’ ๐‘™ โ‡’ ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— โ‰ค ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘™ + ๐‘ฆ๐‘™ โˆ’ ๐‘ฆ๐‘— โ‰ค ๐‘˜ โˆ’ ๐‘™ + ๐‘™ โˆ’ ๐‘— = ๐‘˜ โˆ’ ๐‘—

2 4 6 xi xj

xk Claim 1. All pairs of good numbers are satisfied. Test Pick a random edge (๐‘—, ๐‘˜) from the 2-spanner and reject if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—.

slide-10
SLIDE 10

Is a list Lipschitz or ๐œ-far from Lipschitz?

3 2 2 4 6 6 7

Analysis:

  • Call a pair (๐‘—, ๐‘˜) violated if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—, and satisfied otherwise.
  • If ๐‘— is an endpoint of a violated edge, call ๐‘ฆ๐‘— bad. Otherwise, call it good.

Proof: If a list is ๐œ-far from Lipschitz, it has โ‰ฅ ๐œ๐‘œ bad numbers. (Claim 1)

  • Each violated edge contributes 2 bad numbers.
  • 2-spanner has โ‰ฅ

๐œ๐‘œ 2 violated edges out of ๐‘œ log ๐‘œ.

2 4 6 xi xj

xk Claim 1. All pairs of good numbers are satisfied. Test Pick a random edge (๐‘—, ๐‘˜) from the 2-spanner and reject if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—. Claim 2. An ๐œ-far list violates โ‰ฅ ๐œ/(2 log ๐‘œ) fraction of edges in 2-spanner.

slide-11
SLIDE 11

Is a list Lipschitz or ๐œ-far from Lipschitz?

3 2 2 4 6 6 7

Analysis:

  • Call a pair (๐‘—, ๐‘˜) violated if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—, and satisfied otherwise.

Sample

4 log ๐‘œ

๐œ

edges (xi ,xj) from the 2-spanner and reject if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—. Guarantee: All Lipschitz lists are accepted. All lists that are ๐œ-far from Lipschitz are rejected with probability โ‰ฅ 2/3. Time: O((log n)/ยฒ)

11

Claim 2. An ๐œ-far list violates โ‰ฅ ๐œ/(2 log ๐‘œ) fraction of edges in 2-spanner. Algorithm

2 4 6 xi xj

xk Test Pick a random edge (๐‘—, ๐‘˜) from the 2-spanner and reject if ๐‘ฆ๐‘˜ โˆ’ ๐‘ฆ๐‘— > ๐‘˜ โˆ’ ๐‘—.

slide-12
SLIDE 12

Testing if a List is Lipschitz: Summary

  • [Jha R]:

We can determine if a list of ๐‘œ numbers is Lipschitz or ๐œ-far from Lipschitz in O

log ๐‘œ

๐œ

time.

  • [Jha R, Blais R Yaroslavtsev, Chakrabarty Dixit Jha Seshadhri]:

This cannot be improved.

slide-13
SLIDE 13

Testing Properties of High-Dimensional Functions

In polylogarithmic time, we can test a large class of properties of functions ๐‘”: 1, โ€ฆ , ๐‘œ ๐‘’ โ†’ โ„, including:

x y

  • Lipschitz property [Jha R]
  • Monotonicity [Goldreich Goldwasser Lehman Ron,

Dodis Goldreich Lehman R Ron Samorodnitsky]

  • Bounded-derivative properties

[Chakrabarty Dixit Jha Seshadhri]

  • Unateness

[Baleshzar Chakrabarty Pallavoor R Seshadhri]

slide-14
SLIDE 14

Sublinear Algorithms: Summary

  • Many problems admit sublinear-time algorithms
  • Algorithms are often simple
  • Analysis requires creation of interesting combinatorial,

geometric and algebraic tools

  • Unexpected connections to other areas
  • Many open questions
slide-15
SLIDE 15

Private Data Analysis

Individuals Data Analysts Curator x = ๐‘ฆ๐‘’ ๐‘ฆ๐‘’โˆ’1 ๐‘ฆ3 ๐‘ฆ2 ๐‘ฆ1

๏ ๏ (Queries) Answers

Typical examples: census, medical studies, what big companies want to publish about our dataโ€ฆ Two conflicting goals

  • Protect privacy of individuals
  • Differential privacy [Dwork McSherry Nissim Smith 06]
  • Give accurate answers
slide-16
SLIDE 16

Neighboring Datasets

Two datasets ๐‘ฆ, ๐‘ฆโ€ฒ are neighbors if they differ in one personโ€™s data. ๐‘ฆ๐‘’ ๐‘ฆ๐‘’โˆ’1 ๐‘ฆ3 ๐‘ฆ2 ๐‘ฆ1 ๐‘ฆ๐‘’ ๐‘ฆ๐‘’โˆ’1 ๐’šโ€ฒ๐Ÿ’ ๐‘ฆ2 ๐‘ฆ1

๏ ๏

๐‘ฆ ๐‘ฆโ€ฒ

slide-17
SLIDE 17

Differential Privacy [Dwork McSherry Nissim Smith]

๐‘ฆ๐‘’ ๐‘ฆ๐‘’โˆ’1 ๐‘ฆ3 ๐‘ฆ2 ๐‘ฆ1 ๐‘ฆ๐‘’ ๐‘ฆ๐‘’โˆ’1 ๐’šโ€ฒ๐Ÿ’ ๐‘ฆ2 ๐‘ฆ1

๏ ๏

๐‘ฆ ๐‘ฆโ€ฒ Privacy Definition An algorithm A is ๐‘-differentially private if for all pairs of neighbors ๐’š, ๐’šโ€ฒ and all sets of answers S:

๐๐ฌ ๐‘ฉ ๐’š โˆˆ ๐‘ป โ‰ค ๐’‡๐‘ ๐๐ฌ ๐‘ฉ ๐’šโ€ฒ โˆˆ ๐‘ป

slide-18
SLIDE 18

Properties of Differential Privacy

  • Composition:

If algorithms ๐ต1 and ๐ต2 are ๐œ—-differentially private then algorithm that outputs (๐ต1 ๐‘ฆ , ๐ต2(๐‘ฆ)) is 2๐œ—-differentially private

  • Meaningful in the presence of arbitrary external information

18

slide-19
SLIDE 19

19

Output Perturbation

Frameworks for designing differentially private algorithms

slide-20
SLIDE 20

Output Perturbation

Individuals Data Analysts Curator x = ๐‘ฆ๐‘’ ๐‘ฆ๐‘’โˆ’1 ๐‘ฆ3 ๐‘ฆ2 ๐‘ฆ1

๏ Evaluate ๐’ˆ(๐’š) A ๐’š = ๐’ˆ ๐’š + ๐’๐’‘๐’‹๐’•๐’‡

slide-21
SLIDE 21

Global Sensitivity Framework

Global sensitivity of a function ๐‘” is Example: ๐‘ฆ1, โ€ฆ , ๐‘ฆ๐‘œ โˆˆ 0,1 , ave ๐‘ฆ =

๐‘ฆ1+โ‹ฏ+๐‘ฆ๐‘œ ๐‘œ

  • ๐ป๐‘‡ave = ?

๐‘ฏ๐‘ป๐’ˆ = max

๐จ๐Ÿ๐ฃ๐ก๐ข๐œ๐ฉ๐ฌ๐‘ก ๐‘ฆ,๐‘ฆโ€ฒ ๐‘” ๐‘ฆ โˆ’ ๐‘” ๐‘ฆโ€ฒ .

slide-22
SLIDE 22

Global Sensitivity Framework

Global sensitivity of a function ๐‘” is Example: ๐‘ฆ1, โ€ฆ , ๐‘ฆ๐‘œ โˆˆ 0,1 , ave ๐‘ฆ =

๐‘ฆ1+โ‹ฏ+๐‘ฆ๐‘œ ๐‘œ

  • ๐ป๐‘‡ave = 1/๐‘œ

๐‘ฏ๐‘ป๐’ˆ = max

๐จ๐Ÿ๐ฃ๐ก๐ข๐œ๐ฉ๐ฌ๐‘ก ๐‘ฆ,๐‘ฆโ€ฒ ๐‘” ๐‘ฆ โˆ’ ๐‘” ๐‘ฆโ€ฒ .

Theorem [Dwork McSherry Nissim Smith]

If ๐ต ๐‘ฆ = ๐‘” ๐‘ฆ + ๐‘€๐‘๐‘ž

๐ป๐‘‡๐‘” ๐œ—

then ๐ต is ๐œ—-differentially private.

slide-23
SLIDE 23

Global Sensitivity: Noise Distribution

Laplace distribution Lap(๐œ‡) has density โ„Ž ๐‘ง =

1 2๐œ‡ โ‹… ๐‘“โˆ’ ๐‘ง

๐œ‡

(mean 0, standard deviation 2 โ‹… ๐œ‡) Laplace Mechanism Theorem [Dwork McSherry Nissim Smith]

If ๐ต ๐‘ฆ = ๐‘” ๐‘ฆ + ๐‘€๐‘๐‘ž

๐ป๐‘‡๐‘” ๐œ—

then ๐ต is ๐œ—-differentially private. Sliding Property of ๐‘€๐‘๐‘ž

๐ป๐‘‡๐‘” ๐œ—

for all ๐‘ง, ๐œ€:

โ„Ž ๐‘ง โ„Ž ๐‘ง+๐œ€ โ‰ค ๐‘“ ๐œ—โ‹… ๐œ€

๐ป๐‘‡๐‘”

slide-24
SLIDE 24

When is Laplace Mechanism Useful?

  • Laplace mechanism is always private.
  • When is it accurate?

Example: ๐‘ฆ1, โ€ฆ , ๐‘ฆ๐‘œ โˆˆ 0,1 , ave ๐‘ฆ =

๐‘ฆ1+โ‹ฏ+๐‘ฆ๐‘œ ๐‘œ

  • ๐ป๐‘‡ave = 1/๐‘œ

Noise= Lap

1 ๐œ—๐‘œ

Accurate when GS is low (and ๐‘œ, the size of the database, is sufficiently large)

slide-25
SLIDE 25

Can Global Sensitivity Be Too High?

Example: ๐‘ฆ1, โ€ฆ , ๐‘ฆ๐‘œ โˆˆ 0,1 , ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆ is median of ๐‘ฆ1, โ€ฆ , ๐‘ฆ๐‘œ.

  • ๐ป๐‘‡median = ?
  • Noise: Lap

1 ๐œ—

  • But for most neighboring datasets ๐‘ฆ and ๐‘ฆโ€ฒ,

๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆ โˆ’ ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆโ€ฒ is small

  • Can we add less noise on ``goodโ€™โ€™ datasets?

แ‰Š

๐‘ฆ = 0 โ€ฆ 0 0 1 โ€ฆ 1

๐‘œ โˆ’ 1 2

แ‰Š

๐‘œ โˆ’ 1 2

๐‘ฆโ€ฒ = 0 โ€ฆ 0 1 1 โ€ฆ 1

๐‘œ โˆ’ 1 2

แ‰Š

๐‘œ โˆ’ 1 2

แ‰Š

๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆ = 0 ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆโ€ฒ = 1

๐‘ˆ๐‘๐‘ ๐‘›๐‘ฃ๐‘‘โ„Ž ๐‘œ๐‘๐‘—๐‘ก๐‘“!

slide-26
SLIDE 26

26

Smooth Sensitivity Framework

[Nissim Raskhodnikova Smith]

slide-27
SLIDE 27

Local Sensitivity

Local sensitivity of a function ๐‘”at point ๐‘ฆ is Relationship to GS: ๐ป๐‘‡๐‘” = max

๐ž๐›๐ฎ๐›๐ญ๐Ÿ๐ฎ๐ญ ๐‘ฆ ๐‘€๐‘‡ ๐‘” ๐‘ฆ

Example: ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘๐‘” 0 โ‰ค ๐‘ฆ1 โ‰ค โ‹ฏ โ‰ค ๐‘ฆ๐‘œ โ‰ค 1 for odd ๐‘œ.

  • L๐‘‡median (๐‘ฆ)= ?

27

๐‘ด๐‘ป๐’ˆ(๐’š) = max

๐‘ฆโ€ฒ: ๐จ๐Ÿ๐ฃ๐ก๐ข๐œ๐ฉ๐ฌ ๐‘๐‘” ๐‘ฆ ๐‘” ๐‘ฆ โˆ’ ๐‘” ๐‘ฆโ€ฒ .

1 ๐’š๐Ÿ ๐’š๐’โˆ’๐Ÿ ๐’š๐’ ๐’š๐’+๐Ÿ ๐’š๐’ median

โ€ฆ โ€ฆ

new median when ๐‘ฆ1

โ€ฒ = 1

new median when ๐‘ฆ๐‘œ

โ€ฒ = 0

slide-28
SLIDE 28

Local Sensitivity

Local sensitivity of a function ๐‘”at point ๐‘ฆ is Relationship to GS: ๐ป๐‘‡๐‘” = max

๐ž๐›๐ฎ๐›๐ญ๐Ÿ๐ฎ๐ญ ๐‘ฆ ๐‘€๐‘‡ ๐‘” ๐‘ฆ

Example: ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘๐‘” 0 โ‰ค ๐‘ฆ1 โ‰ค โ‹ฏ โ‰ค ๐‘ฆ๐‘œ โ‰ค 1 for odd ๐‘œ.

  • L๐‘‡median (๐‘ฆ)= max(๐‘ฆ๐‘›+1 โˆ’ ๐‘ฆ๐‘›, ๐‘ฆ๐‘› โˆ’ ๐‘ฆ๐‘›โˆ’1)

Goal: Release ๐‘”(๐‘ฆ) with less noise when ๐‘€๐‘‡๐‘” ๐‘ฆ is lower.

28

1 ๐’š๐Ÿ ๐’š๐’โˆ’๐Ÿ ๐’š๐’ ๐’š๐’+๐Ÿ ๐’š๐’ median new median when ๐‘ฆ1

โ€ฒ = 1

new median when ๐‘ฆ๐‘œ

โ€ฒ = 0

โ€ฆ โ€ฆ ๐‘ด๐‘ป๐’ˆ(๐’š) = max

๐‘ฆโ€ฒ: ๐จ๐Ÿ๐ฃ๐ก๐ข๐œ๐ฉ๐ฌ ๐‘๐‘” ๐‘ฆ ๐‘” ๐‘ฆ โˆ’ ๐‘” ๐‘ฆโ€ฒ .

slide-29
SLIDE 29

First Attempt: Local Sensitivity

Noise with magnitude proportional to ๐‘€๐‘‡๐‘”(๐‘ฆ) instead of ๐ป๐‘‡๐‘”? Problem: noise magnitude might reveal information. Example: median

  • Idea: make noise magnitude an ``insensitiveโ€™โ€™ function

29

แ‰Š

๐‘ฆ = 0 โ€ฆ 0 000 1 โ€ฆ 1

๐‘œ โˆ’ 3 2

แ‰Š

๐‘œ โˆ’ 3 2

๐‘ฆโ€ฒ = 0 โ€ฆ 0 001 1 โ€ฆ 1

๐‘œ โˆ’ 3 2

แ‰Š

๐‘œ โˆ’ 3 2

แ‰Š ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆ = 0 ๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆโ€ฒ = 0 ๐‘€๐‘‡๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆ = 0 ๐‘€๐‘‡๐‘›๐‘“๐‘’๐‘—๐‘๐‘œ ๐‘ฆโ€ฒ = 1 Pr ๐ต ๐‘ฆ = 0 = 1 Pr ๐ต ๐‘ฆโ€ฒ = 0 = 0 ๐ต is not differentially private

slide-30
SLIDE 30

Smooth Bounds on Local Sensitivity

Design sensitivity function ๐‘‡ ๐‘ฆ

  • ๐‘‡(๐‘ฆ) is an ๐œ—-smooth upper bound on ๐‘€๐‘‡๐‘”(๐‘ฆ) if

โ€“ for all ๐‘ฆ: ๐‘‡ ๐‘ฆ โ‰ฅ ๐‘€๐‘‡๐‘”(๐‘ฆ) โ€“ for all neighbors ๐‘ฆ, ๐‘ฆโ€ฒ: ๐‘‡ ๐‘ฆ โ‰ค ๐‘“๐œ— ๐‘‡(๐‘ฆโ€ฒ) Example: ๐ป๐‘‡๐‘” is a smooth bound on ๐‘€๐‘‡๐‘” ๐‘ฆ .

30

Theorem

If ๐ต ๐‘ฆ = ๐‘” ๐‘ฆ + ๐‘œ๐‘๐‘—๐‘ก๐‘“

๐‘‡(๐‘ฆ) ๐œ—

then ๐ต is (๐œ—โ€ฒ, ๐œ€)-diff. private.

๐‘‡(๐‘ฆ)

slide-31
SLIDE 31

Smooth Sensitivity

  • For two datasets ๐‘ฆ and ๐‘ง, let ๐‘’๐‘—๐‘ก๐‘ข(๐‘ฆ, ๐‘ง)= ๐‘—: ๐‘ฆ๐‘— โ‰  ๐‘ง๐‘—
  • Smooth sensitivity ๐‘‡๐‘”

โˆ— ๐‘ฆ =

max

๐ž๐›๐ฎ๐›๐ญ๐Ÿ๐ฎ๐ญ ๐’› ๐‘€๐‘‡๐‘” ๐‘ง โ‹… ๐‘“โˆ’๐œ—โ‹…๐‘’๐‘—๐‘ก๐‘ข(๐‘ฆ,๐‘ง).

  • Intuition: ๐‘‡๐‘”

โˆ— ๐‘ฆ is low when ๐‘ฆ is far from sensitive datasets

31

Lemma

  • 1. Smooth sensitivity is an ๐œ—-smooth upper bound on ๐‘€๐‘‡๐‘”.
  • 2. For every ๐œ—-smooth upper bound ๐‘‡ on ๐‘€๐‘‡๐‘”:

๐‘‡๐‘”

โˆ— ๐‘ฆ โ‰ค ๐‘‡(๐‘ฆ) for all ๐‘ฆ.

slide-32
SLIDE 32

Computing Smooth Sensitivity

Recall: Smooth sensitivity ๐‘‡๐‘”

โˆ— ๐‘ฆ = max ๐’›

๐‘€๐‘‡๐‘” ๐‘ง โ‹… ๐‘“โˆ’๐œ—โ‹…๐‘’๐‘—๐‘ก๐‘ข(๐‘ฆ,๐‘ง). Example: median ๐‘€๐‘‡median

๐‘™

๐‘ฆ

=

max

๐’–=๐Ÿ,๐Ÿ,โ€ฆ,๐’+๐Ÿ(๐‘ฆ๐‘›+๐‘ข+๐‘™+1โˆ’๐‘ฆ๐‘›+๐‘ข)

This gives ๐‘ƒ(๐‘œ2) time algorithm for computing ๐‘‡median

โˆ—

๐‘ฆ . (It can be computed in time ๐‘ƒ(๐‘œ log ๐‘œ).)

33

Observation

๐‘‡๐‘”

โˆ— ๐‘ฆ =

max

๐’=๐Ÿ,๐Ÿ,โ€ฆ,๐’ ๐‘€๐‘‡๐‘” ๐‘™ ๐‘ฆ โ‹… ๐‘“โˆ’๐œ—โ‹…๐‘™,

where ๐‘€๐‘‡๐‘”

๐‘™ ๐‘ฆ

= max

๐’›:๐’†๐’‹๐’•๐’– ๐’š,๐’› โ‰ค๐’ ๐‘€๐‘‡ ๐‘” ๐‘ง .

1 ๐’š๐Ÿ ๐’š๐’โˆ’๐’โˆ’๐Ÿ ๐’š๐’ ๐’š๐’+๐Ÿ ๐’š๐’

โ€ฆ โ€ฆ โ€ฆ

๐’š๐’+๐’+๐Ÿ โ€ฆ

โ€ฆ

slide-33
SLIDE 33

Conclusion: Calibrating Noise

  • Adding noise proportional to local sensitivity is not safe.
  • Smooth sensitivity framework allows one to calibrate noise to

the input dataset.

โ€“ Requires understanding combinatorial structure of the problem.

  • There are other frameworks based on local sensitivity:

โ€“ Propose-Test-Release [Dwork Lei, Karwa R Smith Yaroslavtsev] โ€“ Sample-and-Aggregate [Nissim R Smith]

34

slide-34
SLIDE 34

Conclusion: Differential Privacy

  • a rigorous and widely applicable notion of privacy
  • is defined in terms of algorithm
  • requires the algorithm to be randomized
  • puts a restriction on the algorithm, requiring that output

distributions on neighboring datasets be close

  • is used in 2020 Census, by Apple and Google

35