Appendix E. Composition Proofs
This appendix contains proofs for several theorems from Chapter 2: basic sequential composition, general sequential composition, parallel composition, and immunity to postprocessing. While you won’t need to memorize these to prepare a DP release, working through each step can give you a deeper understanding of the behaviors of a DP mechanism. Further, knowing how to use composition and postprocessing will help you address more DP scenarios and build more complex pipelines.
Theorem: Basic Sequential Composition
Given an -DP mechanism and an -DP mechanism , then applying each mechanism in sequence to a data set provides -differential privacy.
Proof
For notational simplicity, let’s start with the following scenario: you have an -DP mechanism called , an -DP mechanism called , and a data set D. If you apply to D, and then apply to D, the result is -DP, that is, the privacy loss sums. In fact, the order doesn’t matter here, so long as they are independent.
For some outcome Y, you can use independence and know that:
and for an adjacent data set , this also holds:
Dividing these two statements yields:
Now, you can group and together:
By the definition of -DP, the first term is less than or equal to and ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access