Optimal Binary Differential Privacy via Graphs

被引:1
|
作者
Torkamani S. [1 ]
Ebrahimi J.B. [2 ,3 ]
Sadeghi P. [4 ]
D'Oliveira R.G.L. [5 ]
Medard M. [6 ]
机构
[1] Sharif University of Technology, Department of Mathematical Sciences, Tehran
[2] Sharif University of Technology, Center for Information Systems and Data Science, Institute for Convergence Science and Technology, Department of Mathematical Sciences, Tehran
[3] Institute for Research in Fundamental Sciences (IPM), School of Mathematics, Tehran
[4] University of New South Wales, School of Engineering and Technology, Canberra, 2600, ACT
[5] Clemson University, School of Mathematical and Statistical Sciences, Clemson, 29634, SC
[6] Massachusetts Institute of Technology, Research Laboratory of Electronics, Cambridge, 02139, MA
关键词
Differential privacy; graph theory; information theory;
D O I
10.1109/JSAIT.2024.3384183
中图分类号
学科分类号
摘要
We present the notion of reasonable utility for binary mechanisms, which applies to all utility functions in the literature. This notion induces a partial ordering on the performance of all binary differentially private (DP) mechanisms. DP mechanisms that are maximal elements of this ordering are optimal DP mechanisms for every reasonable utility. By looking at differential privacy as a randomized graph coloring, we characterize these optimal DP in terms of their behavior on a certain subset of the boundary datasets we call a boundary hitting set. In the process of establishing our results, we also introduce a useful notion that generalizes DP conditions for binary-valued queries, which we coin as suitable pairs. Suitable pairs abstract away the algebraic roles of ɛ δ in the DP framework, making the derivations and understanding of our proofs simpler. Additionally, the notion of a suitable pair can potentially capture privacy conditions in frameworks other than DP and may be of independent interest. © 2020 IEEE.
引用
收藏
页码:162 / 174
页数:12
相关论文
共 50 条
  • [1] Optimal Accounting of Differential Privacy via Characteristic Function
    Zhu, Yuqing
    Dong, Jinshuo
    Wang, Yu-Xiang
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 151, 2022, 151
  • [2] Differential Privacy for Binary Functions via Randomized Graph Colorings
    D'Oliveira, Rafael G. L.
    Medard, Muriel
    Sadeghi, Parastoo
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 473 - 478
  • [3] Analyzing Graphs with Node Differential Privacy
    Kasiviswanathan, Shiva Prasad
    Nissim, Kobbi
    Raskhodnikova, Sofya
    Smith, Adam
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 457 - 476
  • [4] Optimal Distribution of Privacy Budget in Differential Privacy
    Bkakria, Anis
    Tasidou, Aimilia
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Bouattour, Fatma
    Ben Fredj, Feten
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, 2019, 11391 : 222 - 236
  • [5] The Optimal Mechanism in Differential Privacy
    Geng, Quan
    Viswanath, Pramod
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 2371 - 2375
  • [6] Publishing Graphs Under Node Differential Privacy
    Jian, Xun
    Wang, Yue
    Chen, Lei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (04) : 4164 - 4177
  • [7] Edge Differential Privacy for Algebraic Connectivity of Graphs
    Chen, Bo
    Hawkins, Calvin
    Yazdani, Kasra
    Hale, Matthew
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 2764 - 2769
  • [8] Improved Differential Privacy for SGD via Optimal Private Linear Operators on Adaptive Streams
    Denisov, Sergey
    McMahan, H. Brendan
    Rush, Keith
    Smith, Adam
    Thakurta, Abhradeep
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [9] Distributed Differential Privacy via Shuffling
    Cheu, Albert
    Smith, Adam
    Ullman, Jonathan
    Zeber, David
    Zhilyaev, Maxim
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 375 - 403
  • [10] Differential Privacy via Wavelet Transforms
    Xiao, Xiaokui
    Wang, Guozhang
    Gehrke, Johannes
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (08) : 1200 - 1214