3.8 Proceedings Paper

The Complexity of Computing the Optimal Composition of Differential Privacy

Journal

THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I
Volume 9562, Issue -, Pages 157-175

Publisher

SPRINGER INTERNATIONAL PUBLISHING AG
DOI: 10.1007/978-3-662-49096-9_7

Keywords

Differential privacy; Composition; Computational complexity; Approximation algorithms

Ask authors/readers for more resources

In the study of differential privacy, composition theorems (starting with the original paper of Dwork, McSherry, Nissim, and Smith (TCC'06)) bound the degradation of privacy when composing several differentially private algorithms. Kairouz, Oh, and Viswanath (ICML'15) showed how to compute the optimal bound for composing k arbitrary (epsilon, delta)-differentially private algorithms. We characterize the optimal composition for the more general case of k arbitrary (epsilon(1), delta(1)), ... , (epsilon(k), delta(k))-differentially private algorithms where the privacy parameters may differ for each algorithm in the composition. We show that computing the optimal composition in general is #P-complete. Since computing optimal composition exactly is infeasible (unless FP=#P), we give an approximation algorithm that computes the composition to arbitrary accuracy in polynomial time. The algorithm is a modification of Dyer's dynamic programming approach to approximately counting solutions to knapsack problems (STOC'03).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available