Appendix E. Composition Proofs
This appendix contains proofs for several theorems from Chapter 2: basic sequential composition, general sequential composition, parallel composition, and immunity to postprocessing. While you won’t need to memorize these to prepare a DP release, working through each step can give you a deeper understanding of the behaviors of a DP mechanism. Further, knowing how to use composition and postprocessing will help you address more DP scenarios and build more complex pipelines.
Theorem: Basic Sequential Composition
Given an -DP mechanism and an -DP mechanism , then applying each mechanism in sequence to a data set provides -differential privacy.
Proof
For notational simplicity, let’s start with the following scenario: you have an -DP mechanism called , an -DP mechanism called , and a data set D. If you apply to D, and then apply to D, the result is -DP, that is, the privacy loss sums. In fact, the order doesn’t matter here, so long as they are independent.
For some outcome Y, you can use independence and know that:
and for an adjacent data set , this also holds:
Dividing these two statements yields: ...
Get Hands-On Differential Privacy now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.