Proving differential privacy in Hoare logic

被引:33
|
作者
Barthe, Gilles [1 ]
Gaboardi, Marco [2 ]
Arias, Emilio Jesus Gallego [3 ]
Hsu, Justin [3 ]
Kunz, Cesar [1 ]
Strub, Pierre-Yves [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] Univ Dundee, Dundee DD1 4HN, Scotland
[3] Univ Penn, Philadelphia, PA 19104 USA
关键词
SECURE INFORMATION-FLOW;
D O I
10.1109/CSF.2014.36
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Differential privacy is a rigorous, worst-case notion of privacy-preserving computation. Informally, a probabilistic program is differentially private if the participation of a single individual in the input database has a limited effect on the program's distribution on outputs. More technically, differential privacy is a quantitative 2-safety property that bounds the distance between the output distributions of a probabilistic program on adjacent inputs. Like many 2-safety properties, differential privacy lies outside the scope of traditional verification techniques. Existing approaches to enforce privacy are based on intricate, non-conventional type systems, or customized relational logics. These approaches are difficult to implement and often cumbersome to use. We present an alternative approach that verifies differential privacy by standard, non-relational reasoning on non-probabilistic programs. Our approach transforms a probabilistic program into a non-probabilistic program which simulates two executions of the original program. We prove that if the target program is correct with respect to a Hoare specification, then the original probabilistic program is differentially private. We provide a variety of examples from the differential privacy literature to demonstrate the utility of our approach. Finally, we compare our approach with existing verification techniques for privacy.
引用
收藏
页码:411 / 424
页数:14
相关论文
共 50 条
  • [21] A Hoare logic for linear systems
    Arthan, Rob
    Martin, Ursula
    Oliva, Paulo
    [J]. FORMAL ASPECTS OF COMPUTING, 2013, 25 (03) : 345 - 363
  • [22] A genetically modified Hoare logic
    Bernot, G.
    Comet, J-P
    Khalis, Z.
    Richard, A.
    Roux, O.
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 765 : 145 - 157
  • [23] A CATEGORICAL INTERPRETATION OF PARTIAL FUNCTION LOGIC AND HOARE LOGIC
    KNIJNENBURG, PMW
    NORDEMANN, F
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 620 : 229 - 240
  • [24] On Hoare logic, Kleene algebra, and types
    Kozen, D
    [J]. IN THE SCOPE OF LOGIC: METHODOLOGY & PHILOSOPHY OF SCIENCE, 2002, 315 : 119 - 133
  • [25] Hoare logic for ARM machine code
    Myreen, Magnus O.
    Fox, Anthony C. J.
    Gordon, Michael J. C.
    [J]. INTERNATIONAL SYMPOSIUM ON FUNDAMENTALS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4767 : 272 - +
  • [26] Indexed and Fibred Structures for Hoare Logic
    Wolter, U. E.
    Martini, A. R.
    Hausler, E. H.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2020, 348 : 125 - 145
  • [27] A Hoare Logic for Energy Consumption Analysis
    Kersten, Rody
    Toldin, Paolo Parisen
    van Gastel, Bernard
    van Eekelen, Marko
    [J]. FOUNDATIONAL AND PRACTICAL ASPECTS OF RESOURCE ANALYSIS, FOPARA 2013, 2014, 8552 : 93 - 109
  • [28] Quantum Hoare Logic with Ghost Variables
    Unruh, Dominique
    [J]. 2019 34TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2019,
  • [29] Formalization of the General Hoare Logic Laws
    Kupusinac, Aleksandar
    Malbaski, Dusan
    [J]. TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2012, 1 (03): : 145 - 150
  • [30] Deciding KAT and Hoare Logic with Derivatives
    Almeida, Ricardo
    Broda, Sabine
    Moreira, Nelma
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (96): : 127 - 140