2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS) 2019
DOI: 10.1109/focs.2019.00014
|View full text |Cite
|
Sign up to set email alerts
|

How to Use Heuristics for Differential Privacy

Abstract: We develop theory for using heuristics to solve computationally hard problems in differential privacy. Heuristic approaches have enjoyed tremendous success in machine learning, for which performance can be empirically evaluated. However, privacy guarantees cannot be evaluated empirically, and must be proven -without making heuristic assumptions. We show that learning problems over broad classes of functions -those that have polynomially sized universal identification sets -can be solved privately and efficient… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 48 publications
(60 reference statements)
0
10
0
Order By: Relevance
“…This is because such protocols are ≈ ε/ √ n differentially private when viewed in the central model of differential privacy (in which the input may be permuted before used in the protocol)[4,21], and hence the distribution on transcripts would be almost unchanged even if the entire dataset was resampled i.i.d. from D [13,28]…”
mentioning
confidence: 99%
“…This is because such protocols are ≈ ε/ √ n differentially private when viewed in the central model of differential privacy (in which the input may be permuted before used in the protocol)[4,21], and hence the distribution on transcripts would be almost unchanged even if the entire dataset was resampled i.i.d. from D [13,28]…”
mentioning
confidence: 99%
“…"Dual Query" [15] uses a dual representation of the optimization problem implicitly solved by [29,19,18] to trade off the need to manipulate exponentially large state with the need to solve concisely defined but NP-hard integer programs. The theory of "oracle efficient" synthetic data release was further developed in [26], and [36] give further improvements on oracle efficient algorithms in this dual representation, and promising experimental results. We compare against the algorithm from [36] in our empirical results.…”
Section: Additional Related Workmentioning
confidence: 99%
“…In the body of work on private learning algorithms, a significant amount of effort has gone into developing algorithms for the private PAC model [KLN `08], namely the setting of differentially private binary classification (see Section 2.1 for a formal definition). Some papers on this fundamental topic include [KLN `08, BBKN14, BNSV15, FX14, BNS14, BDRS18, BNS19, ALMM19, KLM `20, BLM20b,NRW19,Bun20]. A remarkable recent development [ALMM19,BLM20b] in this area is the result that a hypothesis class F of binary classifiers is learnable with approximate differential privacy (Definition 2.2) if and only if it is online learnable, i.e., has finite Littlestone dimension (Definition 2.5).…”
Section: Introductionmentioning
confidence: 99%