Abstract
We give the first differentially private algorithms that estimate a variety of geometric features of points in the Euclidean space, such as diameter, width, volume of convex hull, min-bounding box, min-enclosing ball, etc. Our work relies heavily on the notion of Tukey-depth. Instead of (non-privately) approximating the convex-hull of the given set of points P, our algorithms approximate the geometric features of DP pκq - the κ-Tukey region induced by P (all points of Tukey-depth κ or greater). Moreover, our approximations are all bi-criteria: for any geometric feature µ our pα, ∆q-approximation is a value “sandwiched” between p1 αqµpDP pκqq and p1 αqµpDP pκ ∆qq. Our work is aimed at producing a pα, ∆q-kernel of DP pκq, namely a set S such that (after a shift) it holds that p1 αqDP pκq Ă CHpSq Ă p1 αqDP pκ ∆q. We show that an analogous notion of a bi-critera approximation of a directional kernel, as originally proposed by [1], fails to give a kernel, and so we result to subtler notions of approximations of projections that do yield a kernel. First, we give differentially private algorithms that find pα, ∆q-kernels for a “fat” Tukey-region. Then, based on a private approximation of the min-bounding box, we find a transformation that does turn DP pκq into a “fat” region but only if its volume is proportional to the volume of DP pκ ∆q. Lastly, we give a novel private algorithm that finds a depth parameter κ for which the volume of DP pκq is comparable to the volume of DP pκ ∆q. We hope our work leads to the further study of the intersection of differential privacy and computational geometry.
Original language | English |
---|---|
Title of host publication | 2nd Conference on Information-Theoretic Cryptography, ITC 2021 |
Editors | Stefano Tessaro |
Publisher | Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing |
ISBN (Electronic) | 9783959771979 |
DOIs | |
State | Published - 1 Jul 2021 |
Event | 2nd Conference on Information-Theoretic Cryptography, ITC 2021 - Virtual, Bertinoro, Italy Duration: 23 Jul 2021 → 26 Jul 2021 |
Publication series
Name | Leibniz International Proceedings in Informatics, LIPIcs |
---|---|
Volume | 199 |
ISSN (Print) | 1868-8969 |
Conference
Conference | 2nd Conference on Information-Theoretic Cryptography, ITC 2021 |
---|---|
Country/Territory | Italy |
City | Virtual, Bertinoro |
Period | 23/07/21 → 26/07/21 |
Bibliographical note
Publisher Copyright:© 2021 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing. All rights reserved.
Funding
Funding Much of this work was done when the first author was adviced by the second author, and was supported by grant #2017–06701 of the Natural Sciences and Engineering Research Council of Canada (NSERC). In addition, this work was partially done when O.S. was a participant of the Simons’ Institute for the Theory of Computing program of Data-Privacy. O.S. is supported by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office, and by ISF grant no. 2559/20.
Funders | Funder number |
---|---|
Natural Sciences and Engineering Research Council of Canada | |
Israel Science Foundation | 2559/20 |
Keywords
- Computational geometry
- Differential privacy
- Tukey depth