Supplementary Material for Priv’IT: Private and Sample Efficient Identity Testing
نویسندگان
چکیده
We will prove the theorem for the case where β = 1/3, the general case follows at the cost of a multiplicative log(1/β) in the sample complexity from a standard amplification argument. To be more precise, we can consider splitting our dataset into O(log(1/β)) sub-datasets and run the β = 1/3 test on each one independently. We return the majority result – since each test is correct with probability ≥ 2/3, correctness of the overall test follows by Chernoff bound. It remains to argue privacy – note that a neighboring dataset will only result in a single sub-dataset being changed. Since we take the majority result, conditioning on the result of the other sub-tests, the result on this sub-dataset will either be irrelvant to or equal to the overall output. In the former case, any test is private, and in the latter case, we know that the individual test is ε-differentially private. Overall privacy follows by applying the law of total probability. We require the following two claims, which give bounds on the random variables Ni and Yi. Note that, due to the fact that we draw Poisson(m) samples, each Ni ∼ Poisson(mpi) independently.
منابع مشابه
Differentially Private Identity and Closeness Testing of Discrete Distributions
We investigate the problems of identity and closeness testing over a discrete population from random samples. Our goal is to develop efficient testers while guaranteeing Differential Privacy to the individuals of the population. We describe an approach that yields sample-efficient differentially private testers for these problems. Our theoretical results show that there exist private identity a...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملDifferentially Private Testing of Identity and Closeness of Discrete Distributions
We study the fundamental problems of identity testing (goodness of fit), and closeness testing (two sample test) of distributions over k elements, under differential privacy. While the problems have a long history in statistics, finite sample bounds for these problems have only been established recently. In this work, we derive upper and lower bounds on the sample complexity of both the problem...
متن کاملIdentification of the Quantitative Dimensions of Supplementary Private Tutoring among High School Students
Identification of the Quantitative Dimensions of Supplementary Private Tutoring among High School Students Y. Shiraavand* A. Ma’dandaar Aaraani, Ph.D.** I. Nikpey, Ph.D.*** To identify the quantitative dimensions of supplementary private tutoring, a cluster sample of 800 high school students was given a questionnaire on the subject. The collected data reveal that moti...
متن کاملPriv'IT: Private and Sample Efficient Identity Testing
We develop differentially private hypothesis testing methods for the small sample regime. Given a sample D from a categorical distribution p over some domain Σ, an explicitly described distribution q over Σ, some privacy parameter ε, accuracy parameter α, and requirements βI and βII for the type I and type II errors of our test, the goal is to distinguish between p = q and dTV(p, q) ≥ α. We pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017