Differential privacy is among the most prominent techniques for preserving privacy of sensitive data, oweing to its robust mathematical guarantees and general applicability to a vast array of computations on data, including statistical analysis and machine learning. Previous work demonstrated that concrete implementations of differential privacy mechanisms are vulnerable to statistical attacks. This vulnerability is caused by the approximation of real values to floating point numbers. This paper presents a practical solution to the finite-precision floating point vulnerability, where the inverse transform sampling of the Laplace distribution can itself be inverted, thus enabling an attack where the original value can be retrieved with non-negligible advantage. The proposed solution has the advantages of being (i) mathematically sound, (ii) generalisable to any infinitely divisible probability distribution, and (iii) of simple implementation in modern architectures. Finally, the solution has been designed to make side channel attack infeasible, because of inherently exponential, in the size of the domain, brute force attacks.
翻译:隐私差异是保护敏感数据隐私的最突出技术之一,这归功于其强有力的数学保障和对大量数据计算(包括统计分析和机器学习)的普遍适用性,此前的工作表明,具体实施差异隐私机制很容易受到统计攻击的影响。这种脆弱性是实际值接近浮点数造成的。本文为有限精度浮点脆弱性提供了一个实际解决方案,拉皮尔分布的反转化抽样本身可以倒转,从而使得能够进行攻击,在攻击中可以以不可忽略的优势检索原始价值。拟议解决方案的优点是:(一) 数学上健全,(二) 易于任何无限易变概率分布,(三) 在现代结构中简单实施。最后,设计解决方案是为了使边道攻击变得不可行,因为边道攻击在面积上具有内在的指数性,即粗力攻击。