InstaHide's Sample Complexity When Mixing Two Private Images

Inspired by InstaHide challenge [Huang, Song, Li and Arora'20], [Chen, Song and Zhuo'20] recently provides one mathematical formulation of InstaHide attack problem under Gaussian images distribution. They show that it suffices to use $O(n_{\mathsf{priv}}^{k_{\mathsf{priv}} - 2/(k_{\mathsf{priv}} + 1)})$ samples to recover one private image in $n_{\mathsf{priv}}^{O(k_{\mathsf{priv}})} + \mathrm{poly}(n_{\mathsf{pub}})$ time for any integer $k_{\mathsf{priv}}$, where $n_{\mathsf{priv}}$ and $n_{\mathsf{pub}}$ denote the number of images used in the private and the public dataset to generate a mixed image sample. Under the current setup for the InstaHide challenge of mixing two private images ($k_{\mathsf{priv}} = 2$), this means $n_{\mathsf{priv}}^{4/3}$ samples are sufficient to recover a private image. In this work, we show that $n_{\mathsf{priv}} \log ( n_{\mathsf{priv}} )$ samples are sufficient (information-theoretically) for recovering all the private images.

[1]  Vojtech Rödl,et al.  Complexity of representation of graphs by set systems , 1981, Discret. Appl. Math..

[2]  Maciej M. Syslo,et al.  A Labeling Algorithm to Recognize a Line Digraph and Output its Root Graph , 1982, Inf. Process. Lett..

[3]  Zhao Song,et al.  On InstaHide, Phase Retrieval, and Sparse Matrix Factorization , 2020, ArXiv.

[4]  Vangelis Th. Paschos,et al.  Sub-exponential Approximation Schemes for CSPs: from Dense to Almost Sparse , 2015, STACS.

[5]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[6]  Kai Li,et al.  TextHide: Tackling Data Privacy for Language Understanding Tasks , 2020, FINDINGS.

[7]  Philippe G. H. Lehot An Optimal Algorithm to Detect a Line Graph and Output Its Root Graph , 1974, JACM.

[8]  Somesh Jha,et al.  An Attack on InstaHide: Is Private Learning Possible with Instance Encoding? , 2020, ArXiv.

[9]  Nick Roussopoulos,et al.  A MAX{m, n} Algorithm for Determining the Graph H from Its Line Graph C , 1973, Inf. Process. Lett..

[10]  Russell Impagliazzo,et al.  Complexity of k-SAT , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).

[11]  Yin Tat Lee,et al.  A Faster Interior Point Method for Semidefinite Programming , 2020, 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS).

[12]  Kai Li,et al.  InstaHide: Instance-hiding Schemes for Private Distributed Learning , 2020, ICML.

[13]  Klaus Simon,et al.  A Dynamic Algorithm for Line Graph Recognition , 1995, WG.

[14]  Piet Van Mieghem,et al.  ILIGRA: An Efficient Inverse Line Graph Algorithm , 2015, J. Math. Model. Algorithms Oper. Res..

[15]  Michael S. Jacobson,et al.  Recognizing Intersection Graphs of Linear Uniform Hypergraphs , 1997, Graphs Comb..

[16]  I. E. ZVEROVICH An analogue of the Whithey theorem for edge graphs of multigraphs, and edge multigraphs , 1997 .

[17]  Virginia Vassilevska Williams,et al.  Multiplying matrices faster than coppersmith-winograd , 2012, STOC '12.

[18]  P. Berman,et al.  On Some Tighter Inapproximability Results , 1998, Electron. Colloquium Comput. Complex..

[19]  H. Whitney Congruent Graphs and the Connectivity of Graphs , 1932 .