Information-theoretic Bounds for Differentially Private Mechanisms

被引:48
|
作者
Barthe, Gilles
Koepf, Boris
机构
关键词
Quantitative Information-Flow; Differential Privacy; Information Theory;
D O I
10.1109/CSF.2011.20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data. Each line of research has developed its own notion of confidentiality: on the one hand, differential privacy is the emerging consensus guarantee used for privacy-preserving data analysis. On the other hand, information-theoretic notions of leakage are used for characterizing the confidentiality properties of programs in language-based settings. The purpose of this article is to establish formal connections between both notions of confidentiality, and to compare them in terms of the security guarantees they deliver. We obtain the following results. First, we establish upper bounds for the leakage of every epsilon-differentially private mechanism in terms of epsilon and the size of the mechanism's input domain. We achieve this by identifying and leveraging a connection to coding theory. Second, we construct a class of epsilon-differentially private channels whose leakage grows with the size of their input domains. Using these channels, we show that there cannot be domain-size-independent bounds for the leakage of all epsilon-differentially private mechanisms. Moreover, we perform an empirical evaluation that shows that the leakage of these channels almost matches our theoretical upper bounds, demonstrating the accuracy of these bounds. Finally, we show that the question of providing optimal upper bounds for the leakage of epsilon-differentially private mechanisms in terms of rational functions of epsilon is in fact decidable.
引用
收藏
页码:191 / 204
页数:14
相关论文
共 50 条
  • [1] Differentially Private Federated Learning: An Information-Theoretic Perspective
    Asoodeh, Shahab
    Chen, Wei-Ning
    Calmon, Flavio P.
    Ozgur, Ayfer
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 344 - 349
  • [2] Information-Theoretic Bounds for Integral Estimation
    Adams, Donald Q.
    Batik, Adarsh
    Honorio, Jean
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 742 - 747
  • [3] Robust information-theoretic private information retrieval
    Beimel, Amos
    Stahl, Yoav
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 295 - 321
  • [4] Robust Information-Theoretic Private Information Retrieval
    Amos Beimel
    Yoav Stahl
    [J]. Journal of Cryptology, 2007, 20 : 295 - 321
  • [5] Robust information-theoretic private information retrieval
    Beimel, A
    Stahl, Y
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 326 - 341
  • [6] Information-Theoretic Private Interactive Mechanism
    Moraffah, Bahman
    Sankar, Lalitha
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 911 - 918
  • [7] Strengthened Information-theoretic Bounds on the Generalization Error
    Issa, Ibrahim
    Esposito, Amedeo Roberto
    Gastpar, Michael
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 582 - 586
  • [8] Models and information-theoretic bounds for nanopore sequencing
    Mao, Wei
    Diggavi, Suhas
    Kannan, Sreeram
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2458 - 2462
  • [9] Information-Theoretic Bounds for Adaptive Sparse Recovery
    Aksoylar, Cem
    Saligrama, Venkatesh
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 1311 - 1315
  • [10] Information-theoretic bounds on target recognition performance
    Jain, A
    Moulin, P
    Miller, MI
    Ramchandran, K
    [J]. AUTOMATIC TARGET RECOGNITION X, 2000, 4050 : 347 - 358