Analytic calibration for differential privacy with Gaussian perturbations
The Gaussian mechanism is an essential building block used in multitude of differentially private data analysis algorithms. In this paper we revisit the Gaussian mechanism and show that the original analysis has several important limitations. Our analysis reveals that the variance formula for the original mechanism is far from tight in the high privacy regime (ε→ 0) and it cannot be extended to the low privacy regime (ε→∞). We address this limitations by developing an analytic Gaussian mechanism whose variance is calibrated directly using the Gaussian cumulative density function instead of a tail bound approximation. We also propose to equip the Gaussian mechanism with a post-processing step based on adaptive denoising estimators by leveraging that the variance of the perturbation is known. Our experiments show that analytical calibration removes at least a third of the variance of the noise compared to the classical Gaussian mechanism, and that denoising dramatically improves the accuracy of the Gaussian mechanism in the high-dimensional regime.READ FULL TEXT VIEW PDF
Analytic calibration for differential privacy with Gaussian perturbations
Output perturbation is a cornerstone of mechanism design in differential privacy (DP). Well-known mechanisms in this class are the Laplace and Gaussian mechanisms Dwork et al. (2006); Dwork and Roth (2014)
. More complex mechanisms are often obtained by composing multiple applications of these basic output perturbation mechanisms. For example, the Laplace mechanism is the basic building block of the sparse vector mechanismDwork et al. (2009)
, and the Gaussian mechanism is the building block of private empirical risk minimization algorithms based on stochastic gradient descentBassily et al. (2014). Analysing the privacy of such complex mechanisms turns out to be a delicate and error-prone task Lyu et al. (2017). In particular, obtaining tight privacy analyses leading to optimal utility is one of the main challenges in the design of advanced DP mechanisms. An alternative to tight a-priori analyses is to equip complex mechanisms with algorithmic noise calibration and accounting methods. These methods use numerical computations to, e.g. calibrate perturbations and compute cumulative privacy losses at run time, without relying on hand-crafted worst-case bounds. For example, recent works have proposed methods to account for the privacy loss under compositions occurring in complex mechanisms Rogers et al. (2016); Abadi et al. (2016).
In this work we revisit the Gaussian mechanism and develop two ideas to improve the utility of output perturbation DP mechanisms based on Gaussian noise. The first improvement is an algorithmic noise calibration strategy that uses numerical evaluations of the Gaussian cumulative density function (CDF) to obtain the optimal variance to achieve DP using Gaussian perturbation. The analysis and the resulting algorithm are provided in Section 3. In order to motivate the need for a numerical approach to calibrate the noise of a DP Gaussian perturbation mechanism, we start with an analysis of the main limitations of the classical Gaussian mechanism in Section 2. A numerical evaluation provided in Section 5.1 showcases the advantages of our optimal calibration procedure.
The second improvement equips the Gaussian perturbation mechanism with a post-processing step which denoises the output using adaptive estimation techniques from the statistics literature. Since DP is preserved by post-processing and the distribution of the perturbation added to the desired outcome is known, this allows a mechanism to achieve the desired privacy guarantee while increasing the accuracy of the released value. The relevant denoising estimators and their utility guarantees are discussed in Section 4. Results presented in this section are not new: they are the product of a century’s worth of research in statistical estimation. Our contribution is to compile relevant results scattered throughout the literature in a single place and showcase their practical impact in synthetic (Section 5.2) and real (Section 5.3) datasets, thus providing useful pointers and guidelines for practitioners.
Let be an input space equipped with a symmetric neighbouring relation . Let and be two privacy parameters. A -valued randomized algorithm is -DP Dwork et al. (2006) if for every pair of neighbouring inputs and every possible (measurable) output set the following inequality holds:
The definition of DP captures the intuition that a computation on private data will not reveal sensitive information about individuals in a dataset if removing or replacing an individual in the dataset has a negligible effect in the output distribution.
In this paper we focus on the family of so-called output perturbation DP mechanisms. An output perturbation mechanism for a deterministic vector-valued computation is obtained by computing the function on the input data
and then adding random noise sampled from a random variableto the output. The amount of noise required to ensure the mechanism satisfies a given privacy guarantee typically depends on how sensitive the function is to changes in the input and the specific distribution chosen for . The Gaussian mechanism gives a way to calibrate a zero mean isotropic Gaussian perturbation to the global sensitivity of as follows.
For any , the Gaussian output perturbation mechanism with is -DP.
A natural question one can ask about this result is whether this value of provides the minimal amount of noise required to obtain -DP with Gaussian perturbations. Another natural question is what happens in the case . This section addresses both these questions. First we show that the value of given in Theorem 1 is suboptimal in the high privacy regime . Then we show that this problem is in fact inherent to the usual proof strategy used to analyze the Gaussian mechanism. We conclude the section by showing that for large values of
the standard deviation of a Gaussian perturbation that provides)-DP must scale like . This implies that the scaling provided by the classical Gaussian mechanism in the range cannot be extended beyond any bounded interval.
To illustrate the sub-optimality of the classical Gaussian mechanism in the regime we start by showing it is possible to achieve -DP using Gaussian perturbations. This clearly falls outside the capabilities of the classical Gaussian mechanism, since the standard deviation provided by Theorem 1 grows to infinity as .
A Gaussian output perturbation mechanism with is -DP333Proofs for all results given in the paper are presented in Appendix A..
Previous analyses of the Gaussian mechanism are based on a simple sufficient condition for DP in terms of the privacy loss random variable Dwork and Roth (2014). The next section explains why the usual analysis of the Gaussian mechanism cannot yield tight bounds for the regime . This shows that our example is not a corner case, but a fundamental limitation of trying to establish -DP through said sufficient condition.
Given a vector-valued mechanism let denote the density of the random variable
. The privacy loss function ofon a pair of neighbouring inputs is defined as
The privacy loss random variable is the transformation of the output random variable by the function . For the particular case of a Gaussian mechanism with it is well-known that the privacy loss random variable is also Gaussian Dwork and Rothblum (2016).
The privacy loss of a Gaussian output perturbation mechanism follows a distribution with , where .
The privacy analysis of the classical Gaussian mechanism relies on the following sufficient condition: a mechanism is -DP if the privacy loss satisfies
Since Lemma 3 shows the privacy loss of the Gaussian mechanism is a Gaussian random variable with mean , we have for any pair of datasets with . This observation shows that in general it is not possible to use this sufficient condition for -DP to prove that the Gaussian mechanism achieves -DP for any . In other words, the sufficient condition is not necessary in the regime . We conclude that an alternative analysis is required in order to improve the dependence on in the Gaussian mechanism.
The last question we address in this section is whether the order of magnitude given by Theorem 1 for can be extended to privacy parameters of the form . We show this is not the case by providing the following lower bound.
Let have global sensitivity . Suppose and . If the mechanism with is -DP, then .
Note that as the upper bound on in Theorem 4 converges to . Thus, as increases the range of ’s requiring noise of the order increases to include all parameters of practical interest. This shows that the rate provided by the classical Gaussian mechanism cannot be extended beyond the interval . Note this provides an interesting contrast with the Laplace mechanism, which can achieve -DP with standard deviation in the low privacy regime.
The limitations of the classical Gaussian mechanism described in the previous section suggest there is room for improvement in the calibration of the variance of a Gaussian perturbation to the corresponding global sensitivity. Here we present a method for optimal noise calibration for Gaussian perturbations that we call analytic Gaussian mechanism. To do so we must address the two sources of slack in the classical analysis: the sufficient condition (2) used to reduce the analysis to finding an upper bound for
, and the use of a Gaussian tail approximation to obtain such upper bound. We address the first source of slack by showing that the sufficient condition in terms of the privacy loss random variable comes from a relaxation of a necessary and sufficient condition involving two privacy loss random variables. When specialized to the Gaussian mechanism, this condition involves probabilities about Gaussian random variables, which instead of approximating by a tail bound we represent explicitly in terms of the CDF of the standard univariate Gaussian distribution:
Using this point of view, we introduce a calibration strategy for Gaussian perturbations that requires solving a simple optimization problem involving . We discuss how to solve this optimization at the end of this section.
The first step in our analysis is to provide a necessary and sufficient condition for differential privacy in terms of privacy loss random variables. This is captured by the following result.
A mechanism is -DP if and only if the following holds for every :
Now we can use Lemma 3 to specialize (3) for a Gaussian output perturbation mechanism. The relevant computations are packaged in the following result, where we express the probabilities in (3) in terms of the Gaussian CDF .
Suppose is a Gaussian output perturbation mechanism with . For any let . Then the following hold for any :
This result specializes the left hand side of (3) in terms of the distance between the output means on a pair of neighbouring datasets. To complete the derivation of our analytic Gaussian mechanism we need to ensure that (3) is satisfied for every pair . The next lemma shows that this reduces to plugging the global sensitivity in the place of in (4) and (5).
For any , the function defined as follows is monotonically increasing:
Let be a function with global sensitivity . For any and , the Gaussian output perturbation mechanism with is -DP if and only if
This result shows that in order to obtain an -DP Gaussian output perturbation mechanism for a function with global sensitivity it is enough to find a noise variance satisfying (6). One could now use upper and lower bounds for the tail of the Gaussian CDF to derive an analytic expression for a parameter satisfying this constraint. However, this again leads to a suboptimal result due to the slack in these tail bounds in the non-asymptotic regime. Instead, we propose to find using a numerical algorithm by leveraging the fact that the Gaussian CDF can be written as , where
is the standard error function. Efficient implementations of this function to very high accuracies are provided by most statistical and numerical software packages. However, this strategy requires some care in order to avoid numerical stability issues around the point where the expressionin (6) changes sign. Thus, we further massage the left hand side (6) we obtain the implementation of the analytic Gaussian mechanism given in Algorithm 1. The correctness of this implementation is provided by the following result.
Let be a function with global sensitivity . For any and , the mechanism described in Algorithm 1 is -DP.
Given a numerical oracle for computing based on the error function it is relatively straightforward to implement a solver for finding the values and needed in Algorithm 1. For example, using the fact that is monotonically increasing we see that computing is a root finding problem for which one can use Newton’s method since the derivative of can be computed in closed form using Leibniz’s rule. In practice we find that a simple scheme based on binary search initiated from an interval obtained by finding the smallest such that provides a very efficient and robust way to find up to arbitrary accuracies (the same applies to ).
Can we improve the performance of analytical Gaussian mechanism even further? The answer is “yes” and “no”. We can’t because Algorithm 1 is already the exact calibration of the Gaussian noise level to the given privacy budget. But if we consider the problem of designing the best differentially private procedure that approximates , then there could still be room for improvement.
In this section, we consider a specific class of mechanisms that denoise the output of a Gaussian mechanism. Let , we are interested in designing a post-processing function such that is closer to than . This class of mechanisms are of particular interest for differential privacy because (1) since differential privacy is preserved by post-processing, releasing a function of a differentially private output is again differentially private; (2) since information about and the distribution of the noise are publicly known, this information can be leveraged to design denoising functions.
This is a statistical estimation problem, where is the underlying parameter and is the data. Since in this case we are adding the noise ourselves, it is possible to use the classical statistical theory on Gaussian models as is because the Gaussian assumption is now true by construction. This is however an unusual estimation problem where all we observe is a single data point. Since is the maximum likelihood estimator, if there is no additional information about , we cannot hope to improve the estimation error uniformly over all . But there is still something we can do when we consider either of the following assumptions: (A.1) is drawn from some underlying distribution, thus inducing some distribution on ; or, (A.2) for some , where is the -norm (or pseudo-norm when ).
Assumption A.1 translates the problem of optimal denoising into a Bayesian estimation problem, where the underlying parameter has a prior distribution, and the task is to find an estimator that attains the Bayes risk — the minimum of the average estimation error integrated over a prior , defined as
For square loss, the Bayes estimator is simply the posterior mean estimator, as the following theorem shows:
Let and assume the induced distribution of is square integrable. Then the Bayes estimator is given by
The proof can be found in any standard statistics textbook (see, e.g., Lehmann and Casella, 2006). One may ask what the corresponding MSE is and how much it improves over the version without post-processing. The answer depends on the prior and the amount of noise added for differential privacy. When , the posterior mean estimator can be written analytically into , and the corresponding Bayes risk is . In other word, we get a factor of improvement over simply using .
In general, there is no analytical form for the posterior mean, but if we can evaluate the density of or sample from the distribution of , then we can obtain an arbitrarily good approximation of
using Markov Chain Monte Carlo techniques.
Assumption A.2 spells out a minimax estimation problem, where the underlying parameter is assumed to be within a set . In particular, we are interested in finding that attains the minimax risk
on balls of radius .
A complete characterization of this minimax risk (up to a constant) is given by Birgé and Massart (2001, Proposition 5), who show that in the non-trivial region444When for a constant that depends only on . of the signal to noise ratio , the ball satisfies
for and when , Donoho et al. (1990) show that
Deriving exact minimax estimators is challenging and most analyses assume certain asymptotic regimes (see the case for by Bickel et al. (1981)). Nonetheless, some techniques have been shown to match up to a small constant factor in the finite sample regime (see, e.g., Donoho et al., 1990; Donoho and Johnstone, 1994). This means that we can often improve the square error from to when we have the additional information that is in some ball. This could be especially helpful in the high-dimensional case for . For instance if and , then we obtain a risk , which improves exponentially in over the risk of . More practically, if is a sparse histogram with non-zero elements, then taking will result in an error bound on the order of , which is linear in the sparsity rather than the dimension .
What if we do not know the prior parameter , or a right choice of and ? Can we still come up with estimators that take advantage of these structures? It turns out that this is the problem of designing adaptive estimators which sits at the heart of statistical research. An adaptive estimator in our case, is one that does not need to know or a pair of and , yet behave nearly as well as Bayes estimator that knows or the minimax estimator that knows and for each parameter regime.
We first give an example of an adaptive Bayes estimator that does not require us to specify a prior, yet can perform almost as well as the optimal Bayes estimator for all isotropic Gaussian prior simultaneously.
When , substituting in with its maximum likelihood estimate under
produces the James-Stein estimator
Moreover, it has an MSE
The James-Stein estimator has the property that it always improves the MLE when (Stein, 1956) and it always achieves a risk that is within a multiplicative factor of the Bayes risk of for any .
We now move on to describe a method that is adaptive to and in minimax estimation. Quite remarkably, Donoho (1995) shows that choosing in the soft-thresholding estimator
yields a nearly optimal estimator for every ball.
Let for some . The soft-thresholding estimator with obeys that
The result implies that the soft-thresholding estimator is nearly optimal for all balls up to a multiplicative factor of .
Thanks to the fact that we know the parameter exactly, both and are now completely free of tuning parameters. Yet, they can achieve remarkable adaptivity that covers a large class of model assumptions and function classes. A relatively small price to pay for such adaptivity is that we might lose a constant (or a ) factor. Whether such adaptivity is worth will vary on a case-by-case basis.
where denotes the number of nonzero elements in and is the largest power-law exponent greater than such that order statistics for all and hides logarithmic factors in . The fact that implies that the soft-thresholding estimator improves over the naive private release for all and the factor suggests that we can take advantage of an unknown power law distribution even if the histogram is not really sparse. This makes our technique effective in the many data mining problems where power law distributions occur naturally (Faloutsos et al., 1999).
show that a post-processing step enforcing consistency of contingency table releases and graph degree sequences leads to more accurate estimations.Williams and McSherry (2010)
sets up the general statistical (Bayesian) inference problem of DP releases by integrating auxiliary information (a prior).Karwa et al. (2016) exploits knowledge of the noise distribution use to achieve DP in the inference procedure of a network model and shows that it helps to preserve asymptotic efficiency. Nikolov et al. (2013)
demonstrates that projecting linear regression solutions to a known-ball improves the estimation error from to when the underlying ground truth is sparse. Bernstein et al. (2017)
In all the above references there is some prior knowledge (constraint sets, sparsity or Bayesian prior) that is exploited to improve the utility of DP releases. To the best of our knowledge, we are the first to consider “adaptive estimation” and demonstrate how classical techniques can be helpful even without such prior knowledge. These estimators are not new; they have been known in the statistics literature for decades. Our purpose is to compile facts that are relevant to the practice of DP and initiate a systematic study of how these ideas affect the utility of DP mechanisms, which we complement with the experimental evaluation presented in the next section.
This section provides an experimental evaluation of the improvements in utility provided by optimal calibration and adaptive denoising. First we numerically compare the variance of the analytic Gaussian mechanism and the classical mechanism for a variety of privacy parameters. Then we evaluate the contributions of denoising and analytic calibration against a series of baselines for the task of private mean estimation using synthetic data. We also evaluate several denoising strategies on the task of releasing heat maps based on the New York City taxi dataset under differential privacy. Further experiments are presented in Appendix B, including an evaluation of denoising strategies for the task of private histogram release.
We implemented Algorithm 1 in Python555See https://github.com/BorjaBalle/analytic-gaussian-mechanism. and ran experiments to compare the variance of the perturbation obtained with the analytic Gaussian mechanism versus the variance required by the classical Gaussian mechanism. In all our experiments the values of and were solved up to an accuracy of using binary search and the implementation of the function provided by SciPy Jones et al. (2001).
The results are presented in the two leftmost panels in Figure 1. The plots show that as the optimally calibrated perturbation outperforms the classical mechanism by several orders of magnitude. Furthermore, we see that even for values of close to our mechanism reduces the variance by a factor of or more, with higher improvements for larger values of .
Our next experiment evaluates the utility of denoising combined with the analytical Gaussian mechanism for the task of private mean estimation. The input to the mechanism is a dataset containing vectors and the underlying deterministic functionality is . This relatively simple task is a classic example from the family of linear queries which are frequently considered in the differential privacy literature. We compare the accuracy of several mechanisms for releasing a private version of in terms of the Euclidean distance . In particular, we test the analytical Gaussian mechanism with either James-Stein denoising cf. Theorem 11 (aGM-JS) or optimal thresholding denoising cf. Theorem 12 (aGM-TH), as well as several baselines including: the classical Gaussian mechanism (cGM), the analytical Gaussian mechanism without denoising (aGM), and the Laplace mechanism (Lap) using the same parameter as the Gaussian mechanisms.
To provide a thorough comparison we explore of the different parameters of the problem on the final utility. The key parameters of the problem are the dimension and the DP parameters and . The dimension affects the utility through the bounds provided in Theorem 11 and Theorem 12. The DP parameters affect the utility through the variance of the mechanism, which is also affected by the sample size via the global sensitivity. Thus, we can characterize the effect of by keeping fixed and changing the DP parameters. In our experiments we consider a fixed sample size and privacy parameter while trying several values for .
The other parameter that affects the utility is the “size” of , controlled either through the variance or the norm ball . Since the denoising estimators we use are adaptive to these parameters and do not need to know them in advance, we sample the dataset repeatedly to obtain a diversity of values for . Each dataset is sampled as follows: first sample a center and then build with , where each is i.i.d. with independent coordinates sampled uniformly from the interval . Thus, in each dataset the points all lie in an -ball of radius , leading to a global sensitivity and a global sensitivity . These are used to calibrate the Gaussian and Laplace perturbations, respectively.
The results are presented in two rightmost panels of Figure 1. Each point in every plot is the result of averaging the error over repetitions with different datasets. The first plot uses and shows how denoised methods improve the accuracy over all the other methods, sometimes by orders of magnitude. The second plot shows that for this problem the James-Stein estimator provides better accuracy in the high-dimensional setting.
In this section, we apply our method to New York City taxi data. The dataset is a collection of time-stamped pick-ups and drop-offs of taxi drivers and we are interested in sharing a density map of such pick-ups and drop-offs in Manhattan at a specific time of a specific day under differential privacy.
This is a problem of significant practical interest. Ever since the NYC Taxi & Limousine Commission released this dataset, there has been multiple independent reports concerning the security and privacy risks this dataset poses for taxi drivers and their passengers (see, e.g., Pandurangan, ; Douriez et al., 2016). The techniques presented in this paper allow us to provably prevent individuals (on both the per-trip level and per-cab level) in the dataset from being identified, while remarkably, permitting the release of rich information about the data with fine-grained spatial and temporal resolution.
Specifically, we apply the analytical Gaussian mechanism to release the number of picks-ups and drop-offs at every traffic junction in Manhattan. There are a total of 3,784 such traffic junctions and they are connected by 7,070 sections of roads. We will treat them as nodes and edges on a graph. In the post-processing phase, we apply graph smoothing techniques to reveal the underlying signal despite the noise due to aGM. Specifically, we compare the JS-estimator and the soft-thresholding estimator we described in Section 4, as well as the same soft-thresholding estimator applied to the coefficients of a graph wavelet transform due to Sharpnack et al. (2013). The basis transformation is important because the data might be sparser in the transformed domain. For reference, we also include the state-of-the-art graph smoothing techniques called graph trend filtering (Wang et al., 2016), which has one additional tuning parameter but has been shown to perform significantly better than wavelet smoothing in practice.
Our experiments provide cab-level differential privacy by assuming that every driver does a maximum of trips within an hour so that we have a global -sensitivity of
. This is a conservative but reasonable estimate and can be enforced by preprocessing the data. Data within each hour is gathered and distributed to each traffic junction using a kernel density estimator; further details are documented inDoraiswamy et al. (2014).
We present some qualitative comparisons in Figure 2, where we visualize the privately released heat map with and without post-processing. Relatively speaking, trend filtering performs better than wavelet smoothing, but both approaches significantly improves the RMSE over the DP release without post-processing. The results in Appendix B provide quantitative results by comparing the mean square error of cGM, aGM as well as the aforementioned denoising techniques for data corresponding to different time intervals.
In this paper, we embark on a journey of pushing the utility limit of Gaussian mechanism for -differential privacy. We propose a novel method to obtain the optimal calibration of Gaussian perturbations required to attain a given DP guarantee. We also review decades of research in statistical estimation theory and show that combining these techniques with differential privacy one obtains powerful adaptivity
that denoises differentially private outputs nearly optimally without additional hyperparameters. On synthetic data and on the New York City Taxi dataset we illustrate a significant gain in estimation error and fine-grained spatial-temporal resolution.
There are a number of theoretical problems of interest for future work. First, on the problem of differentially private estimation. Our post-processing approach effectively restricts our choice of algorithms to the composition of privacy release and post-processing. While we now know that we are optimal in both components, it is unclear whether we lose anything relative to the best differentially private algorithms. Secondly, the analytical calibration proposed in this paper is optimal for achieving -DP with Gaussian noise. But when building complex mechanisms we are stuck in the dilemma of choosing between (a) using the aGM with the advanced composition (Kairouz et al., 2015); or, (b) using Rényi DP (Mironov, 2017) or zCDP (Bun and Steinke, 2016) for tighter composition and calculate the from moment bounds. While (a) is tighter in the calculation the privacy parameters of each intermediate value, (b) is tighter in the composition but cannot take advantage of aGM. It would be interesting if we could get the best of both worlds.
We thank Doraiswamy et al. (2014) for sharing their preprocessed NYC taxi dataset, the anonymous reviewers for helpful comments that led to improvements of the paper and Stephen E. Fienberg for discussions that inspired the authors to think about optimal post-processing.
Minimax estimation of the mean of a normal distribution when the parameter space is restricted.The Annals of Statistics, 9(6):1301–1309, 1981.
Proceedings of the forty-first annual ACM symposium on Theory of computing, pages 381–390. ACM, 2009.
In this appendix we present supporting proofs for all the results mentioned in the main text.
An simple way to see that -DP is achievable with Gaussian noise is to recall that -DP is equivalent to a bound of on the total variation (TV) distance between the output distributions of and for any neighbouring pair . If is an output perturbation mechanism for with noise , then using Pinsker’s inequality we have
Thus, we see that a Gaussian perturbation with standard deviation is enough to achieve -DP. ∎
Note that the proof of Theorem 9 shows that a Gaussian perturbation with yields a -DP mechanism, where . Thus, it is not possible to attain -DP with without increasing the variance of the perturbation.
The result follows by showing that the upper bound for proposed in Theorem 4 is a lower bound for . Since , all we need to show is .
Let be the complementary of the standard Gaussian CDF. The Mill’s ratio for the Gaussian distribution is the quantity . Bounding the Mill’s ratio is a standard approach to approximate the tail of the Gaussian distribution. A well-known bound for the Mill’s ratio is Gordon’s inequality Gordon . By using the symmetry we obtain :
Recall that the density of the Gaussian output perturbation mechanism with is given by . Plugging this expression into the definition of the privacy loss function and performing a quick computation we get
To compute the privacy loss random variable we need to plug with in the above inner product. By observing that we obtain the distribution of the privacy loss random variable is given by
Therefore, the privacy loss of the Gaussian mechanism has the form for . ∎
Given a pair of neighbouring datasets let and be the densities of the output random variables and . Note that given an event one can rewrite (1) as follows:
Defining the event and its complementary , we can partition into the sets and . Therefore, by the definition of we have
Because (9) has to hold for any event and the upper bound above holds for any event, we conclude that is -DP if and only if
A similar argument with also shows:
where we used and the symmetry of the distribution of the Gaussian distribution around its mean. A similar argument applied to the left hand side of (5) yields:
We prove the result by using Leibniz’s rule for differentiation under the integral sign to show that the function of interest has non-negative derivatives. First note that from the derivation of (4) we have
where . Now we can use Leibniz’s rule to write
Similarly, for the second term in the function we have where . Using Leibniz’s rule again we get
Therefore, we see that the derivative of satisfies:
where we used that . ∎
Recall that the derivations in Section 3 establish that in order to calibrate a Gaussian perturbation to achieve -DP all that is required is find the smallest such that
To establish the correctness of the analytic Gaussian mechanism we begin by observing that the argument in the first term of (11) changes sign at , while the argument for the second terms is always negative. Thus, we substitute in the expression above and obtain:
To solve the optimization using numerical evaluations of it is convenient to consider the cases and separately. In the case we define and substitute the corresponding in to obtain
Similarly, by taking in the case we obtain
Note that, as expected, these definitions satisfy and , since the limits correspond to and , respectively. Furthermore, we have
which corresponds to the privacy guarantee -DP obtained by taking ; i.e. .
These observations motivate the mechanism described in Algorithm 1. In particular, for we can achieve -DP with