Query Complexity of Bayesian Private Learning

We study the query complexity of Bayesian Private Learning: a learner wishes to locate a random target within an interval by submitting queries, in the presence of an adversary who observes all of her queries but not the responses. How many queries are necessary and sufficient in order for the learner to accurately estimate the target, while simultaneously concealing the target from the adversary? Our main result is a query complexity lower bound that is tight up to the first order. We show that if the learner wants to estimate the target within an error of $\epsilon$, while ensuring that no adversary estimator can achieve a constant additive error with probability greater than $1/L$, then the query complexity is on the order of $L\log(1/\epsilon)$ as $\epsilon \to 0$. Our result demonstrates that increased privacy, as captured by $L$, comes at the expense of a \emph{multiplicative} increase in query complexity. The proof builds on Fano's inequality and properties of certain proportional-sampling estimators.

[1]  A. Roth,et al.  Predicting How People Play Games: Reinforcement Learning in Experimental Games with Unique, Mixed Strategy Equilibria , 1998 .

[2]  R. Duncan Luce,et al.  Individual Choice Behavior: A Theoretical Analysis , 1979 .

[3]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[4]  Jiaming Xu,et al.  Optimal query complexity for private sequential learning , 2019, ArXiv.

[5]  Anand D. Sarwate,et al.  Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..

[6]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[7]  William Gasarch A Survey on Private Information Retrieval , 2004 .

[8]  Pramod Viswanath,et al.  Spy vs. Spy , 2014, SIGMETRICS.

[9]  Adam Wierman,et al.  The empirical implications of privacy-aware choice , 2014, Oper. Res..

[10]  R. Luce,et al.  Individual Choice Behavior: A Theoretical Analysis. , 1960 .

[11]  John N. Tsitsiklis,et al.  Private Sequential Learning , 2018, COLT.

[12]  Joel H. Spencer,et al.  Coping with Errors in Binary Search Procedures , 1980, J. Comput. Syst. Sci..

[13]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[14]  John N. Tsitsiklis,et al.  Delay-Predictability Trade-offs in Reaching a Secret Goal , 2018, Oper. Res..

[15]  Peter I. Frazier,et al.  Bisection Search with Noisy Responses , 2013, SIAM J. Control. Optim..

[16]  Michael Horstein,et al.  Sequential transmission using noiseless feedback , 1963, IEEE Trans. Inf. Theory.

[17]  Kuang Xu,et al.  Reinforcement with Fading Memories , 2018, SIGMETRICS.

[18]  Avinatan Hassidim,et al.  The Bayesian Learner is Optimal for Noisy Binary Search  (and Pretty Good for Quantum as Well) , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[19]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[20]  Leslie G. Valiant,et al.  A theory of the learnable , 1984, STOC '84.

[21]  Aaron Roth,et al.  Iterative Constructions and Private Data Release , 2011, TCC.

[22]  H. Robbins A Stochastic Approximation Method , 1951 .

[23]  Martin J. Wainwright,et al.  Privacy Aware Learning , 2012, JACM.

[24]  Pravesh Kothari,et al.  25th Annual Conference on Learning Theory Differentially Private Online Learning , 2022 .