Supplementary Material for Priv’IT: Private and Sample Efficient Identity Testing

نویسندگان

  • Bryan Cai
  • Constantinos Daskalakis
  • Gautam Kamath
چکیده

We will prove the theorem for the case where β = 1/3, the general case follows at the cost of a multiplicative log(1/β) in the sample complexity from a standard amplification argument. To be more precise, we can consider splitting our dataset into O(log(1/β)) sub-datasets and run the β = 1/3 test on each one independently. We return the majority result – since each test is correct with probability ≥ 2/3, correctness of the overall test follows by Chernoff bound. It remains to argue privacy – note that a neighboring dataset will only result in a single sub-dataset being changed. Since we take the majority result, conditioning on the result of the other sub-tests, the result on this sub-dataset will either be irrelvant to or equal to the overall output. In the former case, any test is private, and in the latter case, we know that the individual test is ε-differentially private. Overall privacy follows by applying the law of total probability. We require the following two claims, which give bounds on the random variables Ni and Yi. Note that, due to the fact that we draw Poisson(m) samples, each Ni ∼ Poisson(mpi) independently.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differentially Private Identity and Closeness Testing of Discrete Distributions

We investigate the problems of identity and closeness testing over a discrete population from random samples. Our goal is to develop efficient testers while guaranteeing Differential Privacy to the individuals of the population. We describe an approach that yields sample-efficient differentially private testers for these problems. Our theoretical results show that there exist private identity a...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Differentially Private Testing of Identity and Closeness of Discrete Distributions

We study the fundamental problems of identity testing (goodness of fit), and closeness testing (two sample test) of distributions over k elements, under differential privacy. While the problems have a long history in statistics, finite sample bounds for these problems have only been established recently. In this work, we derive upper and lower bounds on the sample complexity of both the problem...

متن کامل

Identification of the Quantitative Dimensions of Supplementary Private Tutoring among High School Students

Identification of the Quantitative Dimensions of Supplementary Private Tutoring among High School Students   Y. Shiraavand* A. Ma’dandaar Aaraani, Ph.D.** I. Nikpey, Ph.D.***   To identify the quantitative dimensions of supplementary private tutoring, a cluster sample of 800 high school students was given a questionnaire on the subject. The collected data reveal that moti...

متن کامل

Priv'IT: Private and Sample Efficient Identity Testing

We develop differentially private hypothesis testing methods for the small sample regime. Given a sample D from a categorical distribution p over some domain Σ, an explicitly described distribution q over Σ, some privacy parameter ε, accuracy parameter α, and requirements βI and βII for the type I and type II errors of our test, the goal is to distinguish between p = q and dTV(p, q) ≥ α. We pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017