skip to main content
10.1145/3313276.3316312acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Private PAC learning implies finite Littlestone dimension

Published:23 June 2019Publication History

ABSTRACT

We show that every approximately differentially private learning algorithm (possibly improper) for a class H with Littlestone dimension d requires Ω(log*(d)) examples. As a corollary it follows that the class of thresholds over ℕ can not be learned in a private manner; this resolves open questions due to [Bun et al. 2015] and [Feldman and Xiao, 2015]. We leave as an open question whether every class with a finite Littlestone dimension can be learned by an approximately differentially private algorithm.

References

  1. Maria-Florina Balcan and Vitaly Feldman. 2015.Google ScholarGoogle Scholar
  2. Statistical Active Learning Algorithms for Noise Tolerance and Differential Privacy. Algorithmica 72, 1 (2015), 282–315. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Raef Bassily, Kobbi Nissim, Adam D. Smith, Thomas Steinke, Uri Stemmer, and Jonathan Ullman. 2016. Algorithmic stability for adaptive data analysis. In STOC. ACM, 1046–1059. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Raef Bassily, Om Thakkar, and Abhradeep Thakurta. 2018.Google ScholarGoogle Scholar
  5. Model-Agnostic Private Learning via Stability. CoRR abs/1803.05101 (2018).Google ScholarGoogle Scholar
  6. Amos Beimel, Hai Brenner, Shiva Prasad Kasiviswanathan, and Kobbi Nissim. 2014. Bounds on the sample complexity for private learning and private data release. Machine Learning 94, 3 (2014), 401–437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Amos Beimel, Kobbi Nissim, and Uri Stemmer. 2013. Characterizing the sample complexity of private learners. In ITCS. ACM, 97–110.Google ScholarGoogle Scholar
  8. Amos Beimel, Kobbi Nissim, and Uri Stemmer. 2015. Learning Privately with Labeled and Unlabeled Examples. In SODA. SIAM, 461–477. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Amos Beimel, Kobbi Nissim, and Uri Stemmer. 2016.Google ScholarGoogle Scholar
  10. Private Learning and Sanitization: Pure vs. Approximate Differential Privacy. Theory of Computing 12, 1 (2016), 1–61.Google ScholarGoogle Scholar
  11. Shai Ben-David, Dávid Pál, and Shai Shalev-Shwartz. 2009.Google ScholarGoogle Scholar
  12. Agnostic Online Learning. In COLT.Google ScholarGoogle Scholar
  13. Avrim Blum, Cynthia Dwork, Frank McSherry, and Kobbi Nissim. 2005. Practical privacy: the SuLQ framework. In PODS. ACM, 128–138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Anselm Blumer, Andrzej Ehrenfeucht, David Haussler, and Manfred K. Warmuth. 1989. Learnability and the Vapnik-Chervonenkis dimension. J. Assoc. Comput. Mach. 36, 4 (1989), 929–965. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mark Bun, Kobbi Nissim, and Uri Stemmer. 2016. Simultaneous Private Learning of Multiple Concepts. In ITCS. ACM, 369–380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mark Bun, Kobbi Nissim, Uri Stemmer, and Salil P. Vadhan. 2015. Differentially Private Release and Learning of Threshold Functions. In FOCS. IEEE Computer Society, 634–649. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mark Mar Bun. 2016.Google ScholarGoogle Scholar
  18. New Separations in the Complexity of Differential Privacy. Ph.D. Dissertation. Harvard University, Graduate School of Arts & Sciences.Google ScholarGoogle Scholar
  19. Hunter Chase and James Freitag. 2018. Model Theory and Machine Learning. arXiv preprint arXiv:1801.06566 (2018).Google ScholarGoogle Scholar
  20. Kamalika Chaudhuri, Daniel J. Hsu, and Shuang Song. 2014. The Large Margin Mechanism for Differentially Private Maximization. In NIPS. 1287–1295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Kamalika Chaudhuri, Claire Monteleoni, and Anand D. Sarwate. 2011. Differentially Private Empirical Risk Minimization. Journal of Machine Learning Research 12 (2011), 1069–1109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Rachel Cummings, Katrina Ligett, Kobbi Nissim, Aaron Roth, and Zhiwei Steven Wu. 2016. Adaptive Learning with Robust Generalization Guarantees. In COLT (JMLR Workshop and Conference Proceedings), Vol. 49. JMLR.org, 772–814.Google ScholarGoogle Scholar
  23. Cynthia Dwork and Vitaly Feldman. 2018. Privacy-preserving Prediction. CoRR abs/1803.10266 (2018).Google ScholarGoogle Scholar
  24. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In EUROCRYPT (Lecture Notes in Computer Science), Vol. 4004. Springer, 486–503. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Cynthia Dwork and Jing Lei. 2009. Differential privacy and robust statistics. In STOC. ACM, 371–380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In TCC (Lecture Notes in Computer Science), Vol. 3876. Springer, 265–284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science 9, 3-4 (2014), 211–407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Erdős and R. Rado. 1952.Google ScholarGoogle Scholar
  29. Combinatorial Theorems on Classifications of Subsets of a Given Set. Proceedings of the London Mathematical Society s3-2, 1 (1952), 417–439. 2.1.417Google ScholarGoogle Scholar
  30. Vitaly Feldman and David Xiao. 2015. Sample Complexity Bounds on Differentially Private Learning via Communication Complexity. SIAM J. Comput. 44, 6 (2015), 1740–1764.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R.L. Graham, R.L. Graham, B.L. Rothschild, and J.H. Spencer. 1990.Google ScholarGoogle Scholar
  32. Ramsey Theory. Wiley. https://books.google.com/books?id=55oXT60dC54CGoogle ScholarGoogle Scholar
  33. Wilfrid Hodges. 1997.Google ScholarGoogle Scholar
  34. A Shorter Model Theory. Cambridge University Press, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Marek Karpinski and Angus Macintyre. 1997. Polynomial bounds for VC dimension of sigmoidal and general Pfaffian neural networks. J. Comput. System Sci. 54, 1 (1997), 169–176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam D. Smith. 2011.Google ScholarGoogle Scholar
  37. What Can We Learn Privately? SIAM J. Comput. 40, 3 (2011), 793–826. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Michael C Laskowski. 1992.Google ScholarGoogle Scholar
  39. Vapnik-Chervonenkis Classes of Definable Sets. Journal of the London Mathematical Society 2, 2 (1992), 377–384. Private PAC Learning Implies Finite Littlestone Dimension STOC ’19, June 23–26, 2019, Phoenix, AZ, USAGoogle ScholarGoogle Scholar
  40. Katrina Ligett, Seth Neel, Aaron Roth, Bo Waggoner, and Steven Z. Wu. 2017.Google ScholarGoogle Scholar
  41. Accuracy First: Selecting a Differential Privacy Level for Accuracy Constrained ERM. In NIPS. 2563–2573. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Nick Littlestone. 1987. Learning Quickly When Irrelevant Attributes Abound: A New Linear-threshold Algorithm. Machine Learning 2, 4 (1987), 285–318.Google ScholarGoogle ScholarCross RefCross Ref
  43. Roi Livni and Pierre Simon. 2013. Honest compressions and their application to compression schemes. In Conference on Learning Theory. 77–92.Google ScholarGoogle Scholar
  44. D. Mubayi and A. Suk. 2017. A survey of quantitative bounds for hypergraph Ramsey problems. ArXiv e-prints (July 2017). arXiv: math.CO/1707.04229Google ScholarGoogle Scholar
  45. Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, and Nina Taft. 2009.Google ScholarGoogle Scholar
  46. Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. CoRR abs/0911.5708 (2009).Google ScholarGoogle Scholar
  47. Shai Shalev-Shwartz and Shai Ben-David. 2014.Google ScholarGoogle Scholar
  48. Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Saharon. Shelah. 1978.Google ScholarGoogle Scholar
  50. Salil P. Vadhan. 2017. The Complexity of Differential Privacy. In Tutorials on the Foundations of Cryptography. Springer International Publishing, 347–450.Google ScholarGoogle Scholar
  51. V.N. Vapnik and A.Ya. Chervonenkis. 1971.Google ScholarGoogle Scholar
  52. On the uniform convergence of relative frequencies of events to their probabilities. Theory Probab. Appl. 16 (1971), 264–280.Google ScholarGoogle Scholar
  53. Yu-Xiang Wang, Jing Lei, and Stephen E. Fienberg. 2016.Google ScholarGoogle Scholar

Index Terms

  1. Private PAC learning implies finite Littlestone dimension

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC 2019: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
      June 2019
      1258 pages
      ISBN:9781450367059
      DOI:10.1145/3313276

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 June 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,469of4,586submissions,32%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader