Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)

Slides:



Advertisements
Similar presentations
Improved Approximation for Orienting Mixed Graphs Iftah Gamzu CS Division, The Open Univ., and CS School, Tel-Aviv University Moti Medina EE School, Tel-Aviv.
Advertisements

A threshold of ln(n) for approximating set cover By Uriel Feige Lecturer: Ariel Procaccia.
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Theory of Computing Lecture 18 MAS 714 Hartmut Klauck.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb Ben Gurion University Research partially Supported by the Frankel.
Department of Computer Science & Engineering
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Approximation Algorithms Chapter 5: k-center. Overview n Main issue: Parametric pruning –Technique for approximation algorithms n 2-approx. algorithm.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
February 23, 2015CS21 Lecture 201 CS21 Decidability and Tractability Lecture 20 February 23, 2015.
How Should We Solve Search Problems Privately? Kobbi Nissim – BGU A. Beimel, T. Malkin, and E. Weinreb.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
NP-Complete Problems Reading Material: Chapter 10 Sections 1, 2, 3, and 4 only.
Approximation Algorithms
NP-Complete Problems Problems in Computer Science are classified into
Analysis of Algorithms CS 477/677
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
CSE 421 Algorithms Richard Anderson Lecture 27 NP Completeness.
Toward NP-Completeness: Introduction Almost all the algorithms we studies so far were bounded by some polynomial in the size of the input, so we call them.
1 Slides by Asaf Shapira & Michael Lewin & Boaz Klartag & Oded Schwartz. Adapted from things beyond us.
Hardness Results for Problems
1 Joint work with Shmuel Safra. 2 Motivation 3 Motivation.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
MCS312: NP-completeness and Approximation Algorithms
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
The Complexity of Optimization Problems. Summary -Complexity of algorithms and problems -Complexity classes: P and NP -Reducibility -Karp reducibility.
NP Complexity By Mussie Araya. What is NP Complexity? Formal Definition: NP is the set of decision problems solvable in polynomial time by a non- deterministic.
1 Combinatorial Algorithms Parametric Pruning. 2 Metric k-center Given a complete undirected graph G = (V, E) with nonnegative edge costs satisfying the.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
EMIS 8373: Integer Programming NP-Complete Problems updated 21 April 2009.
Computer Science Day 2013, May Distinguished Lecture: Andy Yao, Tsinghua University Welcome and the 'Lecturer of the Year' award.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Unit 9: Coping with NP-Completeness
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
NP-Complete problems.
CS 3343: Analysis of Algorithms Lecture 25: P and NP Some slides courtesy of Carola Wenk.
CSE 589 Part V One of the symptoms of an approaching nervous breakdown is the belief that one’s work is terribly important. Bertrand Russell.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 30, 2014.
NPC.
NP Completeness Piyush Kumar. Today Reductions Proving Lower Bounds revisited Decision and Optimization Problems SAT and 3-SAT P Vs NP Dealing with NP-Complete.
CSC 413/513: Intro to Algorithms
Why almost all satisfiable k - CNF formulas are easy? Danny Vilenchik Joint work with A. Coja-Oghlan and M. Krivelevich.
CSE 421 Algorithms Richard Anderson Lecture 27 NP-Completeness Proofs.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
Approximation Algorithms based on linear programming.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
Approximation algorithms
ICS 353: Design and Analysis of Algorithms NP-Complete Problems King Fahd University of Petroleum & Minerals Information & Computer Science Department.
The Theory of NP-Completeness
The NP class. NP-completeness
Chapter 10 NP-Complete Problems.
Richard Anderson Lecture 26 NP-Completeness
Richard Anderson Lecture 26 NP-Completeness
NP-Completeness Yin Tat Lee
CS21 Decidability and Tractability
Computability and Complexity
ICS 353: Design and Analysis of Algorithms
Richard Anderson Lecture 25 NP-Completeness
Richard Anderson Lecture 28 NP-Completeness
Richard Anderson Lecture 26 NP-Completeness
NP-Completeness Yin Tat Lee
Presentation transcript:

Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)

x y Let’s compute f(x, y)!

x y No! You will learn too much information on my input!

x y Haven’t you heard of secure function evaluation?

x y Sure I’v heard of it...But for f it will be inefficient

x y That’s not a problem! We can approximate f by f* and do SFE on f*!

x y Hmmmm.... I don’t know...

What can go wrong? Example: f*(x, y) reveals Bob ’ s input. f(134, 285) = 64 f*(134, 285) = f(847, 121) = 26 f*(847, 121) = y Hmmm...

 Background and Previous Work  Definitions for Search Problems  Impossibility Result for Vertex Cover  Algorithms that Leak (Little) Information Positive Result for MAX-3SAT  Problems in P  Conclusions and Open Problems Talk Overview

Private Approximation [FIMNSW] f* is a private approximation for f:  f* is an approximation of f.  f*(x) gives no more information about x then f(x). Privacy definitions:  f*(x) can be simulated given f(x).  If f(x)=f(x’) then f*(x) and f*(x’) should be indistinguishable.

Positive results [FIMNSW]  Hamming distance: Private approximation in communication O(√n). Improved to polylog(n) by [IW]  Permanent: Private approximation in polynomial time.

PA of NP-Hard Functions [HKKN] Vertex Cover Input: undirected graph G=. A set is a vertex cover of G if for every, or. Functional: Return minimum vertex cover size. * We’ll discuss search version later.

G “ Would you tell me the vertex cover size of your graph? ” “ I would, but it is hard to compute. ” “ So, tell me an approximation! ” “ Hmmm …” SERVER CLIENT Client-Server Model

Maximal Matching Approximation  Find maximal matching.  Its vertices form a cover.  2-approximation: solution size is at most 2 times the optimal solution

G “ So, tell me an approximation! ” “ Hmmm …” VC Matching 22 24

Impossibility results [HKKN]  If NP BPP there is no polynomial private n 1-ε -approximation algorithm for vertex cover size.  Impossibility results for other NP- complete functions: MAX-SAT Vertex cover in planer graphs.

 Background and Previous Work  Definitions for Search Problems  Impossibility Result for Vertex Cover  Algorithms that Leak (Little) Information Positive Result for MAX-3SAT  Problems in P  Conclusions and Open Problems Talk Overview

Search problems  Function - one output for every input.  Search - many solutions for one input. Example: vertex cover Return a vertex cover of the graph (a set of vertices).  What is the right definition of privacy?  What pairs of inputs should not be distinguished by the output?

Step 1: Privacy w.r.t. a Relation R – Equivalence relation over the inputs A – Probabilistic algorithm A is private with respect to R if: x y A( ) ≈ c x y

Step 2: Defining the Relation Let P be a search problem. Let S(x) be the set of solutions to the input x. We say that x ≈ P y if x and y have the same set of solutions, that is, S(x)=S(y).

Example – Vertex Cover (Search)  G 1 ≈ VC G 2 if they have the same set of minimum vertex covers.  A is a private approximation algorithm for vertex cover if: A is an approximation algorithm for vertex cover. G 1 ≈ VC G 2  A(G 1 ) A(G 2 )  Can this be done efficiently? ≈ c ≈ VC vertex cover sets: {2,3} and {3,5}

Search versus Functional  In non-private computation: A lower bound for functional implies a lower bound for search.  Private computation: Functional – equivalent (VC size = 2). Search – not equivalent ({2,4} is a VC only of the right graph)

Search versus Functional Can we use the lower bounds techniques of [HKKN] for functional vertex cover? No.  [HKKN] relies on having few equivalence classes.  In search - Huge number of equivalence classes.

 Background and Previous Work  Definitions for Search Problems  Impossibility Result for Vertex Cover  Algorithms that Leak (Little) Information Positive Result for MAX-3SAT  Problems in P  Conclusions and Open Problems Talk Overview

Vertex Cover - Impossibility Result Theorem 1 If P ≠NP there is no deterministic polynomial time n 1-ε -approximation algorithm for vertex cover. Proof idea: Given a private-approximation algorithm A, we construct a greedy algorithm that solves vertex cover exactly.

Definitions for the Proof Let be a graph.  A vertex is critical for if every minimum vertex cover of contains.  A vertex is relevant for if there exists a minimum vertex cover of that contains.  Every vertex is non-critical or relevant (or both).

A Taste of the Proof Claim: Let be a graph and. If then both and are non critical for. A vertex is critical for if every minimum vertex cover of contains. The approximation’s answer teaches us about the optimal solution!

Proof of the Claim Let be a graph and. If then both and are non critical for. is non critical for. Privacy

Relevant / Non-Critical Problem  Input Graph G Vertex v.  Output - one of the following: v is Relevant for G. v is Non-Critical for G.  Enables a greedy algorithm for Vertex Cover.

Claim 2 (Without proof) Polynomial private approximation algorithm for vertex cover (search) implies a polynomial algorithm for the Relevant/Non-Critical problem.

Vertex Cover - Impossibility Result Theorem 1 If P ≠NP there is no deterministic polynomial time n 1-ε -approximation algorithm for vertex cover. randomizedRP NP

 Given a 3CNF formula find an assignment that satisfies a maximum fraction of its clauses.  Best approximation ratio: 7/8.  if and have the same set of maximum satisfying assignments.  Again, no private approximation! MAX-3SAT

 Background and Previous Work  Definitions for Search Problems  Impossibility Result for Vertex Cover  Algorithms that Leak (Little) Information Positive Result for MAX-3SAT  Problems in P  Conclusions and Open Problems Talk Overview

Almost-Private Algorithms [HKKN]  Let f be a function.  f* is a private approximation for f that leaks k bits: f*(x) can be simulated from f(x) and another k bits of advice. Example: There is an efficient 4-approximation of vertex cover size that leaks 1 bit.

Almost-Private Algorithms - Search x y A( ) ≈ c w z ? x y z w

Almost-Private Algorithms is k-private with respect to if there exists such that: Every equivalence class of is a union of at most equivalence classes of. 3. is private with respect to.

Search versus Functional Can we use the ideas of [HKKN] for functions to get efficient almost private algorithms for search problems? No. [HKKN] use rounding of the result of a non-private approximation. Not clear how to generalize to search problems.

Every equivalence class of is divided into subclasses. Almost Private Approximation for MAX-E3SAT and have the same set of maximum satisfying assignments. … …

Lemma 1 There is a set of assignments such that for every 3SAT formula on n variables there exists an that satisfies of the clauses in. Proof: Construct almost 3-wise [NN, AGHP] independent variables. Number of assignments:.

Proof of Lemma 1 (cont.) For every 3 random variables and every 3 Boolean values : Conclusion 1: For each clause : over the choice of. Conclusion 2: For every formula there is an assignment that satisfies of its clauses.

Almost Private Approximation for MAX-3SAT Theorem 2 There exists a -private -approximation algorithm for MAX-3SAT. Proof: We use from Lemma 1. Given a formula return the first that satisfies at least of the clauses in.

Solution-List Paradigm  A short list of solutions.  Every input has a good approximation in the list.  2 k solutions  k-private algorithm

 Background and Previous Work  Definitions for Search Problems  Impossibility Result for Vertex Cover  Algorithms that Leak (Little) Information Positive Result for MAX-3SAT  Problems in P  Conclusions and Open Problems Talk Overview

Problems in P - Private Computation Let S be a search problem in P. (Example: shortest-path) Recall that x ≈ S y if x and y have the same set of solutions. For a private algorithm we require: A(x) ≈ c A(y) Is there a private algorithm for every problem in P? No!

Impossibility result for a Problem in P Input: G=, C, k Output: If C is a clique of size k in G then output a clique of size k in G. The problem is in P because C is a legal output. A private algorithm implies a non- uniform algorithm for Clique.

Positive Results for Problems in P Any problem S for which we can find:  The lexicographically first solution x ≈ S y implies x and y have the same lex first solution.  A random solution x ≈ S y implies that a random solution distributes identically for x and y. Examples: perfect matching, shortest path, linear algebra, and more...

Discussion – Strength of Definition We said the definition is minimal – good for impossibility results. Is it strong enough for positive results? Can returning the lex first solution be considered private? What is the right sufficient definition? (work in progress...)

 Background and Previous Work  Definitions for Search Problems  Impossibility Result for Vertex Cover  Algorithms that Leak (Little) Information Positive Result for MAX-3SAT  Problems in P  Conclusions and Open Problems Talk Overview

Further Results  Impossibility result for (any) (log n)-private -approximation algorithm for vertex cover.  Solution-list -approximation algorithm for vertex cover that leaks bits. [BHN07] improved the lower bound to show that the solution-list algorithm is optimal.

Conclusions  Defined private approximation of search problems  Impossibility result for private approximation of vertex cover  Defined k-private approximation algorithms for search problems  Positive result for MAX-3SAT  Private computation of problems in P

Open Problems  More private approximation algorithms. Design algorithms that defeat solution list algorithms.  Private computation of problems in P. What is the right (sufficient) definition? What search problems admit efficient private computation?

Vertex Cover - Impossibility Result Theorem 1 If P ≠NP there is no deterministic polynomial time n 1-ε -approximation algorithm that is private with respect to ≈ VC. Proof Idea: Given a private n 1-ε -approximation algorithm A, we exactly solve vertex cover.

Definitions for the Proof Let be a graph.  A vertex is critical for if every minimum vertex cover of contains.  A vertex is relevant for if there exists a minimum vertex cover of that contains.  Every vertex is non-critical or relevant (or both).

Claim 1 Let be a graph and. If then both and are non critical for. Note: The claim is useless if.

Proof of Claim 1 Let be a graph and. If then both and are non critical for. is non critical for. Privacy

Relevant / Non-Critical Algorithm  Input Graph G Vertex v.  Output - one of the following: v is Relevant for G. v is Non-Critical for G.  Enables a greedy algorithm for Vertex Cover.

Relevant / Non-Critical Algorithm Let Is ? I is a big set of isolated vertices.

Case 1 is non critical for. Privacy (If was critical for, both copies of would be critical for.)

Case 2 By Claim 1 is not critical for.Claim 1 Let be the size of the minimum vertex cover of. Thus, there exists a minimum cover of that does not contain.

Case 2 (cont.) Assume is not relevant for. must contain both copies of as it does not contain. Thus, contains two non-optimal vertex covers of

Case 2 (cont. ii) However, taking two minimal covers of and adding results in a cover for of size. Contradiction to the minimality of Hence, is relevant for.

Relevant / Non-Critical (Summary)  On input ( ): Define the graph. Compute. Choose. Define the graph. If, output: “ is Non-Critical for. ” If, output: “ is Relevant for. ”

Greedy Vertex Cover  Choose an arbitrary vertex.  Execute the Relevant/Non-Critical algorithm on.  If is Relevant, take and delete all edges adjacent to.  If is Non-Critical, take and delete all edges adjacent to.  Continue recursively.

Vertex Cover - Impossibility Result Theorem 1 If P ≠NP there is no deterministic polynomial time n 1-ε -approximation algorithm for vertex cover. randomizedRP NP