Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Precision-based attacks and interval refining: how to break, then fix, differential privacy on finite computers (2207.13793v1)

Published 27 Jul 2022 in cs.CR

Abstract: Despite being raised as a problem over ten years ago, the imprecision of floating point arithmetic continues to cause privacy failures in the implementations of differentially private noise mechanisms. In this paper, we highlight a new class of vulnerabilities, which we call \emph{precision-based attacks}, and which affect several open source libraries. To address this vulnerability and implement differentially private mechanisms on floating-point space in a safe way, we propose a novel technique, called \emph{interval refining}. This technique has minimal error, provable privacy, and broad applicability. We use interval refining to design and implement a variant of the Laplace mechanism that is equivalent to sampling from the Laplace distribution and rounding to a float. We report on the performance of this approach, and discuss how interval refining can be used to implement other mechanisms safely, including the Gaussian mechanism and the exponential mechanism.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Samuel Haney (8 papers)
  2. Damien Desfontaines (17 papers)
  3. Luke Hartman (5 papers)
  4. Ruchit Shrestha (6 papers)
  5. Michael Hay (20 papers)
Citations (20)

Summary

We haven't generated a summary for this paper yet.