Privacy Against Hypothesis-Testing Adversaries for Quantum Computing

02/24/2023
by   Farhad Farokhi, et al.
0

A novel definition for data privacy in quantum computing based on quantum hypothesis testing is presented in this paper. The parameters in this privacy notion possess an operational interpretation based on the success/failure of an omnipotent adversary being able to distinguish the private categories to which the data belongs using arbitrary measurements on quantum states. Important properties of post processing and composition are then proved for the new notion of privacy. The relationship between privacy against hypothesis-testing adversaries, defined in this paper, and quantum differential privacy are then examined. It is shown that these definitions are intertwined in some parameter regimes. This enables us to provide an interpretation for the privacy budget in quantum differential privacy based on its relationship with privacy against hypothesis testing adversaries.

READ FULL TEXT
research
05/24/2019

Hypothesis Testing Interpretations and Renyi Differential Privacy

Differential privacy is the gold standard in data privacy, with applicat...
research
05/07/2019

Gaussian Differential Privacy

Differential privacy has seen remarkable success as a rigorous and pract...
research
06/22/2023

Quantum Pufferfish Privacy: A Flexible Privacy Framework for Quantum Systems

We propose a versatile privacy framework for quantum systems, termed qua...
research
02/17/2022

Local Differential Privacy for Belief Functions

In this paper, we propose two new definitions of local differential priv...
research
04/16/2019

Non-Stochastic Hypothesis Testing with Application to Privacy Against Hypothesis-Testing Adversary

In this paper, we consider privacy against hypothesis testing adversarie...
research
01/24/2022

Adversarial Classification under Gaussian Mechanism: Calibrating the Attack to Sensitivity

This work studies anomaly detection under differential privacy with Gaus...
research
07/06/2023

Quantum Solutions to the Privacy vs. Utility Tradeoff

In this work, we propose a novel architecture (and several variants ther...

Please sign up or login with your details

Forgot password? Click here to reset