New Lower Bounds for Private Estimation and a Generalized Fingerprinting Lemma

05/17/2022
by   Gautam Kamath, et al.
0

We prove new lower bounds for statistical estimation tasks under the constraint of (ε, δ)-differential privacy. First, we provide tight lower bounds for private covariance estimation of Gaussian distributions. We show that estimating the covariance matrix in Frobenius norm requires Ω(d^2) samples, and in spectral norm requires Ω(d^3/2) samples, both matching upper bounds up to logarithmic factors. We prove these bounds via our main technical contribution, a broad generalization of the fingerprinting method to exponential families. Additionally, using the private Assouad method of Acharya, Sun, and Zhang, we show a tight Ω(d/(α^2 ε)) lower bound for estimating the mean of a distribution with bounded covariance to α-error in ℓ_2-distance. Prior known lower bounds for all these problems were either polynomially weaker or held under the stricter condition of (ε,0)-differential privacy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/14/2020

Differentially Private Assouad, Fano, and Le Cam

Le Cam's method, Fano's inequality, and Assouad's lemma are three widely...
research
10/13/2020

General lower bounds for interactive high-dimensional estimation under information constraints

We consider the task of distributed parameter estimation using sequentia...
research
06/02/2015

Extreme Compressive Sampling for Covariance Estimation

This paper studies the problem of estimating the covariance of a collect...
research
02/14/2019

Dualizing Le Cam's method, with applications to estimating the unseens

One of the most commonly used techniques for proving statistical lower b...
research
01/31/2023

Tight Data Access Bounds for Private Top-k Selection

We study the top-k selection problem under the differential privacy mode...
research
09/30/2022

Optimal Query Complexities for Dynamic Trace Estimation

We consider the problem of minimizing the number of matrix-vector querie...
research
10/04/2018

On the Inner Product Predicate and a Generalization of Matching Vector Families

Motivated by cryptographic applications such as predicate encryption, we...

Please sign up or login with your details

Forgot password? Click here to reset