Proving Differential Privacy with Shadow Execution

03/28/2019
by   Yuxin Wang, et al.
0

Recent work on formal verification of differential privacy shows a trend toward usability and expressiveness -- generating a correctness proof of sophisticated algorithm while minimizing the annotation burden on programmers. Sometimes, combining those two requires substantial changes to program logics: one recent paper is able to verify Report Noisy Max automatically, but it involves a complex verification system using customized program logics and verifiers. In this paper, we propose a new proof technique, called shadow execution, and embed it into a language called ShadowDP. ShadowDP uses shadow execution to generate proofs of differential privacy with very few programmer annotations and without relying on customized logics and verifiers. In addition to verifying Report Noisy Max, we show that it can verify a new variant of Sparse Vector that reports the gap between some noisy query answers and the noisy threshold. Moreover, ShadowDP reduces the complexity of verification: for all of the algorithms we have evaluated, type checking and verification in total takes at most 3 seconds, while prior work takes minutes on the same algorithms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/09/2019

Automated Methods for Checking Differential Privacy

Differential privacy is a de facto standard for statistical computations...
research
09/15/2017

Synthesizing Coupling Proofs of Differential Privacy

Differential privacy has emerged as a promising probabilistic formulatio...
research
04/29/2019

Free Gap Information from the Differentially Private Sparse Vector and Noisy Max Mechanisms

Noisy Max and Sparse Vector are selection algorithms for differential pr...
research
10/08/2020

Testing Differential Privacy with Dual Interpreters

Applying differential privacy at scale requires convenient ways to check...
research
10/21/2020

Contextual Linear Types for Differential Privacy

Language support for differentially-private programming is both crucial ...
research
02/02/2023

Statistical Verification of Traffic Systems with Expected Differential Privacy

Traffic systems are multi-agent cyber-physical systems whose performance...
research
08/17/2020

CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples

We propose CheckDP, the first automated and integrated approach for prov...

Please sign up or login with your details

Forgot password? Click here to reset