2019
DOI: 10.1145/3341697
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzi: a three-level logic for differential privacy

Abstract: Curators of sensitive datasets sometimes need to know whether queries against the data are differentially private [Dwork et al. 2006]. Two sorts of logics have been proposed for checking this property: (1) type systems and other static analyses, which fully automate straightforward reasoning with concepts like "program sensitivity" and "privacy loss, " and (2) full-blown program logics such as apRHL (an approximate, probabilistic, relational Hoare logic) [Barthe et al. 2016], which support more flexible reason… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(25 citation statements)
references
References 39 publications
0
25
0
Order By: Relevance
“…We believe that a promising way forward is to integrate λ obliv 's type-level mechanisms with richer systems for formal reasoning. For example, we could adopt the approach of semantic typing, embedding λ obliv 's type rules as lemmas in a richer logic, as done in RustBelt [Jung et al 2018] or Fuzzi [Zhang et al 2019b]. The logic of Barthe et al [2020] is a good candidate, but it needs further extensions too.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We believe that a promising way forward is to integrate λ obliv 's type-level mechanisms with richer systems for formal reasoning. For example, we could adopt the approach of semantic typing, embedding λ obliv 's type rules as lemmas in a richer logic, as done in RustBelt [Jung et al 2018] or Fuzzi [Zhang et al 2019b]. The logic of Barthe et al [2020] is a good candidate, but it needs further extensions too.…”
Section: Discussionmentioning
confidence: 99%
“…Some prior work aims to quantify the information released by a (possibly randomized) program (e.g., Köpf and Rybalchenko [2013]; Mu and Clark [2009]) according to entropy-based measures. Work on verifying the correctness of differentially private algorithms [Barthe et al 2013;Zhang and Kifer 2017;Zhang et al 2019b], essentially aims to bound possible leakage; by contrast, we enforce that no information leaks due to a program's execution.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The formalization of linguistic meanings within the theory of fuzzy sets is carried out through membership functions (MFs) . The most widespread methods of constructing MFs are based on the statistical processing of expert information and on paired comparisons [4][5][6][18][19][20][21][22][23]. These methods are mainly used in the development of pure expert systems that apply only expert knowledge [7][8][9][10].…”
Section: The Analysis Of Publicationsmentioning
confidence: 99%
“…Type Systems Enriched with Program Logics. At a high level, Fuzzi [56] has a similar aim to Duet: supporting differential privacy for general-purpose programs and supporting recent variants of differential privacy. Duet is designed primarily as a fully-automated type system with a rich set of primitives for vector-based and higher-order programming; low-level mechanisms in Duet are opaque and trusted.…”
Section: Related Workmentioning
confidence: 99%