Differential privacy is among the most prominent techniques for preserving privacy of sensitive data, oweing to its robust mathematical guarantees and general applicability to a vast array of computations on data, including statistical analysis and machine learning. Previous work demonstrated that concrete implementations of differential privacy mechanisms are vulnerable to statistical attacks. This vulnerability is caused by the approximation of real values to floating point numbers. This paper presents a practical solution to the finite-precision floating point vulnerability, where the inverse transform sampling of the Laplace distribution can itself be inverted, thus enabling an attack where the original value can be retrieved with non-negligible advantage. The proposed solution has the advantages of being generalisable to any infinitely divisible probability distribution, and of simple implementation in modern architectures. Finally, the solution has been designed to make side channel attack infeasible, because of inherently exponential, in the size of the domain, brute force attacks.
翻译:隐私差异是保护敏感数据隐私的最突出技术之一,这归功于其强大的数学保障和对大量数据计算(包括统计分析和机器学习)的普遍适用性,包括统计分析和机器学习。先前的工作表明,具体实施差异隐私机制很容易受到统计攻击。这种脆弱性是实际值接近浮点数造成的。本文为有限精度浮点脆弱性提供了一个实际解决方案,拉皮尔分布的反转化抽样本身可以倒置,从而使得能够发动攻击,在攻击中可以以不可忽略的优势检索原始价值。拟议解决方案的优点是,可以被任何无限可忽略的概率分布以及现代结构的简单执行所普遍采用。最后,设计这一解决方案是为了使边道攻击变得不可行,因为边道攻击在面积上具有内在的指数性,即冲力攻击。