Concurrent Composition of Differential Privacy

被引:9
作者
Vadhan, Salil [1 ,2 ]
Wang, Tianhao [1 ,2 ]
机构
[1] Harvard Univ, Cambridge, MA 02138 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2021, PT II | 2021年 / 13043卷
关键词
Interactive differential privacy; Concurrent composition theorem; COMPLEXITY; KNOWLEDGE; NOISE;
D O I
10.1007/978-3-030-90453-1_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We initiate a study of the composition properties of interactive differentially private mechanisms. An interactive differentially private mechanism is an algorithm that allows an analyst to adaptively ask queries about a sensitive dataset, with the property that an adversarial analyst's view of the interaction is approximately the same regardless of whether or not any individual's data is in the dataset. Previous studies of composition of differential privacy have focused on non-interactive algorithms, but interactive mechanisms are needed to capture many of the intended applications of differential privacy and a number of the important differentially private primitives. We focus on concurrent composition, where an adversary can arbitrarily interleave its queries to several differentially private mechanisms, which may be feasible when differentially private query systems are deployed in practice. We prove that when the interactive mechanisms being composed are pure differentially private, their concurrent composition achieves privacy parameters (with respect to pure or approximate differential privacy) that match the (optimal) composition theorem for noninteractive differential privacy. We also prove a composition theorem for interactive mechanisms that satisfy approximate differential privacy. That bound is weaker than even the basic (suboptimal) composition theorem for noninteractive differential privacy, and we leave closing the gap as a direction for future research, along with understanding concurrent composition for other variants of differential privacy.
引用
收藏
页码:582 / 604
页数:23
相关论文
共 25 条
  • [1] Beimel A, 2008, LECT NOTES COMPUT SC, V5157, P451, DOI 10.1007/978-3-540-85174-5_25
  • [2] Composable and Versatile Privacy via Truncated CDP
    Bun, Mark
    Dwork, Cynthia
    Rothblum, Guy N.
    Steinke, Thomas
    [J]. STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 74 - 86
  • [3] Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
    Bun, Mark
    Steinke, Thomas
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 635 - 658
  • [4] Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
  • [5] Chen, 2020, ARXIV PREPRINT ARXIV
  • [6] Dong J., 2019, ARXIV190502383
  • [7] Dwork C., 2016, ARXIV PREPRINT ARXIV
  • [8] Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
  • [9] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
  • [10] The Algorithmic Foundations of Differential Privacy
    Dwork, Cynthia
    Roth, Aaron
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406