Differential Privacy for Euclidean Jordan Algebra with Applications to Private Symmetric Cone Programming
We develop private mechanisms for Euclidean Jordan algebras and private algorithms for symmetric cone programming, this leads to private algorithms for semidefinite programming.
摘要
评审与讨论
This paper studies differentially private symmetric cone programming (SCP). Prior works used private multiplicative-weights for linear programs (LP). But optimization on richer cones such as Lorentz and PSD cones are still open. Because Gaussian mechanisms calibrated in Euclidean norm either introduce dimension-dependent noise or break cone feasibility, no polynomial time algorithm with meaningful utility guarantees existed for constraint-private semidefinite programs (SDP), where a single individual’s data can alter an entire constraint. Using Euclidean Jordan algebras, this paper introduces a cone-aware Gaussian mechanism that matches operator-norm sensitivity and embeds into a rank-sensitive multiplicative-weights framework.
This gets us the first solver for private covering SDP that also extends to all symmetric cones defined in SCP. The main theorem (theorem 5.1 )guarantees approximate feasibility while violating only constraints, matching the linear-program rate when cone rank equals dimension. The mechanism therefore closes the open problem of high-sensitivity, constraint-private optimization beyond linear settings, extending differential privacy guarantees to symmetric cones while retaining polynomial runtime and tight accuracy.
优缺点分析
Strengths: I haven't read the proof but this paper feels very solid. The contribution is mainly from the generic gaussian mechanism that removes the dimension dependence and unlocks the private SCP. I feel like this advancement could have broader implications, potentially benefiting areas like private learning, private sparse PCA, private robust mean/variance estimation, etc.
Weaknesses: Many readers know SDP but not EJA, it would be better if the authors could explain the technical results using examples from Euclidean space.
问题
-
Could the cone-aware Gaussian mechanism be adapted for DP algorithms that currently rely on SDP, such as private sparse PCA or robust mean/variance estimation? What are some potential future works that could benefit from the generic gaussian mechanism and the private SCP?
-
The high-sensitivity solver relies on an exponential-size -net oracle. Can this be replaced by some random sampling, or sketching technique?
局限性
yes
最终评判理由
After rebuttal, my questions are all resolved. I also share Reviewer 5Ady's concern about the positioning of the paper. Overall, I think thi is a good private optimization paper with a focus more on the optimization side.
格式问题
NA
We appreciate your valuable comments. We are happy to address your concerns and questions.
Q: Many readers know SDP but not EJA; it would be better if the authors could explain the technical results using examples from Euclidean space.
A: We agree and will include examples in terms of real symmetric matrices and semidefinite programming (SDP) when explaining the technical results in the revision.
Q: Could the Gaussian mechanism be adapted for DP algorithms that currently rely on SDP? What are some future works that could benefit from the results developed in this paper?
A: We believe our Gaussian mechanism and SDP framework is general enough to address problems that can be “privatized” via solving an SDP privately. For example, robust mean estimation [CDG19] and robust covariance estimation [CDGW19] both require solving a positive SDP; our results can already provide private solutions to these programs, achieving roughly violated constraints, where the constraint matrix has size with ( is the sample size and is the dimension), and is the privacy parameter. For future work, we see two main directions: (1) improving the generic Gaussian mechanism to match the Laplace mechanism for norm, or proving that the Gaussian mechanism is in fact optimal in the EJA setting; (2) applying our private SCP solvers to more problems, such as support vector machines (SVM), which can be formulated as a quadratic program, or matrix completion, which admits a natural SDP convex relaxation.
Q: The high-sensitivity solvers rely on an oracle to an exponential size -net. Could this be replaced by some random sampling or sketching?
A: This is a very interesting question. We believe it is possible to replace the explicit net by the following sampling procedure: for SDP, recall that we require an oracle to the net of the ball . Without loss of generality, assume ; then, one can generate a random by first sampling from a spherical Gaussian and then randomly choosing a radius. Finally, to obtain a point on the net, we could round the sampled point to the nearest point on the net.
References
[CDG19] Chen, Diakonikolas, and Ge. High-dimensional robust mean estimation in nearly-linear time. SODA, 2019.
[CDGW19] Chen, Diakonikolas, Ge, and Woodruff. Faster algorithms for high-dimensional robust covariance estimation. COLT, 2019.
Thanks for your rebuttal. I’ve read and considered your responses carefully and have no additional comments.
The paper provides differentially private SDP solving algorithms where the privacy guarantee is measured by the sensitivity to perturbation in nuclear, spectral or Frobenius norms of the output positive semidefinite matrix. The SDP solvers use multiplicative weights and solve the SDPs approximately in the sense that a fraction of the constraints may be violated. The techniques used to achieve these differentially private solvers are the design and analysis of MMW style algorithms so that DP guarantees can be reduced to ensuring that the oracle is implemented in a ‘privacy preserving’ manner. The private oracles are then implemented using a combination of Gaussian and exponential mechanisms for covariance matrices (some developed in the present work) and epsilon net arguments, that are described using the formalism of Euclidean Jordan Algebras,
While there has been much work of DP for linear programs, there are not many references on DP for SDP solving. This paper takes important steps on DP mechanisms for SDPs and ‘approximately’ solves the DP for 4 different formulations for the closeness of databases. The algorithms do not seem to be optimal in all settings and possibly could be improved by future work.
优缺点分析
-
The paper uses a principled approach to developing differential private mechanisms for SDPs developing first a Gaussian mechanism. It then considering separately 4 different notions of database closeness that may arise and separately solving each using a tailored MMW type algorithm and Gaussian, exponential and Epsilon net type arguments.
-
It could be argued that the Jordan algebra is not really needed and results could be proved using more standard notation. However the use of Jordan algebras provides conceptual clarity for definitions of the Gaussian mechanism and in the construction of the gamma-net in one of the proposed mechanisms for covering SDPs.
-
A weakness is that the Gaussian mechanisms utilize the sensitivity parameter which may not be easy to compute or bound apriori in all cases. For the SDP case this parameter is a bound on change in spectral/Frobenius norm of the solution when a single constraint is added or perturbed.
-
Optimality of the noise added to achieve privacy is also a concern as the quality solution degrades with the extra noise added. Not much is said in the paper on whether this noise rate can be reduced or is optimal under some conditions.
Overall assessment: Assessment: A good paper that carries out a detailed investigation of DP for SDPs in different settings using MMW type algorithms.
问题
-Random matrix theory may be a source of additional improvements on the DP guarantees for SDP solvers. RMT answers questions on the precise change in the spectrum when the entries of the matrix are perturbed by adding additive noise, as in the Gaussian mechanism proposed here.
-
Besides the SDP case, are there any straightforward generalizations to private mechanisms for second order cone programming? Also, can the more recent existing LP results be recovered easily from the Jordan algebra framework?
-
Line 260: Why is an l-infty estimate for the norm of a Gaussian element a major open question?
局限性
Discussed in paper.
最终评判理由
The comments and clarifications addressed sufficiently my remaining questions regarding this paper. I would like to maintain my score of 5.
格式问题
None
We appreciate your insightful and encouraging comments. We are more than happy to address your concerns and answer your questions. In particular, we thank you for highlighting that the use of Jordan algebras provides conceptual clarity, as it offers a clean framework for analyzing parameters: for example, in the case of SDP, we work with collections of symmetric matrices, and the Jordan algebra framework makes explicit whether parameters should depend on the rank or on the dimension .
Q: The Gaussian mechanisms utilize sensitivity parameters which may not be easy to compute or bound a priori in all cases.
A: We agree that computing the sensitivity parameters in advance may not always be straightforward. However, in some cases, we can bound them: for example, in SDP, if the added constraint has bounded spectral or Frobenius norm, or if the perturbation is bounded, then the sensitivity can be controlled.
Q: Optimality of the noise added to achieve privacy is also a concern.
A: We agree that, in this work, we did not prove the optimality of the noise mechanisms. We leave proving optimality of the mechanisms as an important direction for future work. Our main purpose is to initiate the study of DP for SDP, and more generally, for SCP and Jordan algebras. In particular, we wish to highlight a main challenge in this broader setting, namely, the discrepancy between rank and dimension . This distinction does not arise in the classical vector setting where .
Q: Random matrix theory may be a source of additional improvements on the DP guarantees for SDP solvers.
A: Yes, we agree that random matrix theory (RMT) can provide improved bounds when working with symmetric matrices, as noted from Line 256 to 261. In particular, standard results from RMT show that the spectral norm of a random Gaussian matrix scales with , rather than , which can improve bounds in the low-sensitivity constraint privacy regime for SDP. We will include a more explicit discussion of this improvement for SDP in the revision.
Q: Besides SDP, are there any straightforward generalizations to second-order cone programming?
A: For second-order cone programming (SOCP), the -dimensional second-order cone can be viewed as the cone of squares of an -dimensional spin factor, where the Gaussian element is an -dimensional standard Gaussian vector. Notably, the spin factor has constant rank and division algebra dimension , so . Therefore, when applying our SCP results to SOCP, the suboptimality parameter scales with , which matches the scaling for LP.
Q: Can the more recent existing LP results be recovered easily from the Jordan algebra framework?
A: Yes, to recover LP, we observe that for -dimensional LP, there is a unique Jordan frame (the standard basis), and the rank equals the dimension equals . Thus, all LP results can be recovered using our machinery, except that for private covering LP, one no longer needs to use a net argument to discretize the space of primitive idempotents (there are exactly ), so we obtain the scaling in the suboptimality parameter as in prior work [HRRU14].
Q: Line 260: why is the norm of a Gaussian element a major open question?
A: We appreciate your observation. In retrospect, the norm of a Gaussian element is in fact known and depends on the structure of the Jordan algebra. Every Euclidean Jordan algebra is the direct sum of five simple Jordan algebras: real symmetric matrices, complex Hermitian matrices, quaternionic Hermitian matrices, spin factors, and the exceptional quaternionic Hermitian matrices. The first three cases have been well studied in RMT, where the norm scales as . For spin factors (of dimension ), an element can be written as for , and the norm is , so it scales as . As the norm is the maximum over all components of the direct sum, it is if none of the components are spin factors (where is the largest rank), and if there is at least one spin factor. We will include this clarification in the revision.
References
[HRRU14] Hsu, Roth, Roughgarden and Ullman. Privately solving linear programs. ICALP, 2014.
Thank you for the comments and clarifications, they answer my questions regarding this paper. I would like to maintain my score of 5.
This paper proposes a theoretical framework for applying differential privacy (DP) in more complex algebraic spaces using the framework of Euclidean Jordan Algebras (EJA). From a DP perspective, the Gaussian mechanism can be applied when there exists an isometry from the EJA to by adding Gaussian noise in and inverting the isometry. The claimed benefit of the more general framework is a unified approach to a variety of problems, including semidefinite programming problems.
Of note is that this paper is a purely theoretical/algorithmic contribution and does not rely on experimental evidence. I think this is fine, but I wish to forestall criticisms from others about the lack of experiments: it is a reasonable choice by the authors' choice to not do an empirical study.
优缺点分析
For the author's benefit, in the language of journal submissions this is to me a "reject with recommendation to resubmit": the technical results are sound but the presentation is not reflective of the actual contribution.
Strengths:
- The EJA framework is a nice general frame for thinking about DP methods in non-vector settings.
- While using the multiplicative weights (MWU) approach is by now "classic", the authors do a nice job of looking at its instantiation in an important class of problems.
Weaknesses:
The main weakness of the paper (to me) is that the authors saddle themselves with the baggage of differential privacy and accounting for completely unnecessary reasons: understanding SCPs with noisy oracles is, in and of itself, an interesting problem. This has led to a manuscript which obscures, rather than highlights, the main technical contribution. Differential privacy is simply an application or example of what is really going on. There could be other reasons why the oracle is noisy/approximate.
- It is hard to identify new conceptual ideas on privacy side from the EJA formulation given the requirement of an isomorphism to Euclidean space.
- Far too much space in the main manuscript is devoted to a rehash of DP, making the contribution to symmetric cone programming a bit telegraphic.
I am recommending reject based on the manuscript presented for review. This is not a judgment on the merits of the results but rather on whether the paper is a good contribution to the literature.
问题
I can appreciate that the authors are in a bind when writing this paper. Will a NeurIPS reviewer know what an EJA is? Will they know what DP is? Will they have seen SCPs? Will they know only a subset? Therefore they have opted to submit a manuscript which is dominated by basic definitions. I am writing this review as someone who has familiarity (at varying levels) for all 3 (more on DP, textbook-level on the SCPs and JAs).
This paper is basically about noisy SCPs: the noise is Gaussian (no other distributions are investigated). This makes the differential privacy interpretation almost "window-dressing" around the actually interesting part of the paper.
Issue 1: What is the actual DP contribution? By the author's own admission, "the utility guarantee for the generic Gaussian mechanism follows from the isometry property of " so why is the privacy story so important?
- If we can assume there is an isometry why not just work with if the mechanism is effectively ? That seems to be the workhorse of the privacy guarantees: since we are working with -sensitivity the sensitivity bound is preserved by the isometry so there's basically no difference from thinking of a mechanism and using post-processing invariance to apply . That would avoid the need to rebuild any differential privacy definition "from scratch." Am I missing something deeper here?
- The setting of in terms of and is "old fashioned" and does not hold for all : see Balle and Wang (ICML 2019).
- In general, working with and advanced composition is far behind with respect to the privacy accounting literature: just look in Google Scholar for "privacy accounting". Why use the "advanced composition" and not modern methods like the moments accountant, RDP, etc.? These have been around for well over 5 years.
- From a purely motivational standpoint, what applications for which privacy is important does the EJA framework "unlock" with respect to prior work?
Issue 2: Is the main technical contribution in showing that MWU can be extended to symmetric cone programming? The paper really gets going in Section 5 and beyond, where they delve into some interesting issues around using MWU in SCPs.
- Spending more time in the actual paper on covering SDPs and noisy optimization (or noisy oracles) would broaden the scope of the paper.
- Is there a way to exploit the specific structure of this problem setting to improving over the "generic" utility guarantees from the exponential mechanism?
- What is the justification for the dual oracle? That is, why should such an oracle exist (the argument that it is useful to have one is there in the paper already).
- Is the unit-norm solution requirement in Theorem C.12 without loss of generality? It seems not.
局限性
Yes.
最终评判理由
I find this reporting requirement overly burdensome given the reviewing load. My responses to the authors are there in the record.
格式问题
None.
We thank you for your thoughtful and detailed comments, and for your clear assessment of our paper's technical soundness. We especially appreciate your insights regarding the framing of our work, and your recognition of the value in our treatment of noisy oracles for Symmetric Cone Programs (SCPs) and the Multiplicative Weights Update (MWU) algorithm in this context. We believe your feedback offers a clear path to significantly improve the manuscript. Below, we address your main concerns and questions.
Motivation and Contribution: Our primary motivation is to answer the open problem in [HRRU14]: can we design a differentially private (DP) solver for semidefinite programming (SDP)? We demonstrate that it is possible to develop DP solvers, in the spirit of [HRRU14], for SDP and more generally for Euclidean Jordan Algebras (EJAs) and SCPs. While noisy SCPs and their MWU algorithms are independently interesting, the DP framework is not merely decorative: differential privacy provides a principled and structured reason to introduce and analyze noise in these algebraic settings. The DP perspective allows us to formalize sensitivity analyses, composition, and utility guarantees in a systematic way that guides the general study of noise in optimization.
Our framework goes beyond the case-by-case approaches in prior work by providing a generic method for DP in EJA/SCP settings, which helps clarify the scaling with rank and dimension for particular applications. This, in turn, “unlocks” a range of downstream private algorithms and improved privacy guarantees for problems such as:
- Private SVMs via SOCP,
- Private matrix completion, robust mean/covariance estimation, and sparse PCA via SDP relaxations,
- Any other task that can be formulated as an SDP or SOCP where privacy of constraints or data is a concern.
On the Role of the EJA Structure and Isometry: We appreciate your careful consideration of our use of isomorphisms between EJAs and . While any EJA of dimension admits such an isomorphism, directly reducing to would obscure crucial algebraic structure. Critically, not all norms in correspond to standard norms in . For instance, sensitivities and utility parameters would often scale with the full dimension , rather than with the rank which is usually much smaller (e.g., for real symmetric matrices, ). Furthermore, as highlighted by an insightful comment from another reviewer, we also observed that the norm of Gaussian elements in EJAs scales as for most simple EJAs, which would not be apparent by treating everything as . Thus, the EJA framework enables sharper, problem-specific bounds and a more precise understanding of the underlying privacy costs.
On Presentation and DP Background: We appreciate your point about the proportion of the manuscript devoted to DP background. Our intention was to ensure accessibility for the optimization and algebra communities, who may not be familiar with differential privacy. In the revision, we will streamline standard DP background, moving technical details to the appendix where possible, and sharpen the exposition to focus more directly on the novel technical contributions in noisy optimization and SCP.
On Privacy Accounting and Mechanism Optimality: We thank you for highlighting the importance of more advanced privacy accounting techniques (such as [BW19], moments accountant, and RDP) that may yield tighter bounds. While we fully agree on their value, our current work is focused on establishing the foundational differentially private framework for EJA/SCP. Incorporating these advanced accounting methods would introduce significant additional technical complexity and analysis, and we believe this goes beyond the scope of this initial theoretical contribution which is already quite dense. We therefore consider developing tighter, optimal bounds using these techniques, and proving the optimality of the mechanisms, to be a critical and exciting direction for future work.
On Specific Technical Points:
- parameter and dependence on : We will update the manuscript per your suggestion and cite [BW19].
- Noisy oracle and MWU for SCP: We agree this contribution is of independent interest and will expand the manuscript to give it more self-contained exposition.
- Improving generic utility beyond the exponential mechanism: This is a fascinating and important question. While our current framework provides generic utility guarantees applicable across the EJA setting, exploring methods to exploit specific EJA structures for tighter utility bounds is a promising avenue for future research, and we are actively considering this.
- Existence of the dual oracle: The dual oracle checks for the constraint that (approximately) violates its condition most, so its existence can be guaranteed by simply checking all constraints.
- Unit-norm requirement in Theorem C.12: You are correct that this is not without loss of generality. As explained in Remark C.13, the isomorphism only preserves the norm. We believe this requirement could indeed be replaced with the standard norm one, and exploring a generalized analysis without this assumption is an important and promising direction for future work.
We are confident that these clarifications and the planned revisions will significantly strengthen the manuscript, making its valuable contributions clearer and more impactful for the NeurIPS audience. Thank you again for your constructive and detailed feedback.
References
[HRRU14] Hsu, Roth, Roughgarden and Ullman. Privately solving linear programs. ICALP, 2014.
[BW19] Balle and Wang. Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising. ICML, 2019.
Thanks for the detailed clarification. I think the introduction needs be more up front about where the novelty really is. In particular the isomorphism basically means there is not much new in the privacy mechanism itself.
This is why I emphasize focusing on noisy oracles with DP as a special case: if you make the paper "primarily" about DP then ignoring composition results would be an instant reject: it is not hard to apply RDP in this setting "off the shelf" and not doing so is just ignoring long-standing relevant literature and the paper should be rejected. Putting it as a special case with another case study/application leaves the privacy engineering piece of it for future work.
Put another way: this is a good optimization paper and an incomplete privacy paper. Putting the emphasis on the privacy is leading with a weak hand.
I will update my score.
Thank you for your response and clarification! Indeed, we agree with you that the optimization is the main novelty and highlight of our work, and differential privacy mainly serves as a motivation for us to design noisy MWU for SCP. In the revision, we will make sure to emphasize on this point, namely, while our motivation is DP, our main novelty lies in the (Gaussian) noise oracle MWU for SCP, and we hope this generic framework could lead to more applications beyond DP.
This paper introduces differential privacy mechanisms for functions with outputs in Euclidean Jordan algebras (EJAs) and applies them to symmetric cone programming (SCP). The main contributions are: (1) a generic Gaussian mechanism for EJAs with , and sensitivity, and (2) private algorithms for SCP under various sensitivity settings using multiplicative weights updates.
优缺点分析
Strengths
- The paper extends differential privacy beyond vector spaces to the more general setting of Euclidean Jordan algebras, which is mathematically non-trivial.
- It addresses the longstanding question of private semidefinite programming posed by Hsu et al. (2014).
- The paper covers multiple sensitivity notions, including high/low sensitivity for constraints, scalars, and objectives.
Weaknesses
While the theoretical contributions are mathematically sound, the paper lacks empirical evidence demonstrating actual performance of DP mechanisms on real-world symmetric cone programming instances.
问题
A weakness of this work is the absence of experimental validation. if possible, Could the authors provide empirical evaluation on some synthetic and real-world symmetric cone programming instances? For example, Medina et al. (2020) demonstrated their private optimization algorithm's effectiveness through experiments showing utility-privacy tradeoffs and comparing against baselines.
[1] Medina, Andrés Muñoz, Umar Syed, Sergei Vassilvitskii, and Ellen Vitercik. "Private optimization without constraint violations." arXiv preprint arXiv:2007.01181 (2020).
局限性
yes
最终评判理由
Authors addressed my questions, and I tend to maintain my score.
格式问题
NA
We thank the reviewer for highlighting the value of empirical evaluation. We fully agree that experimental results can provide important insights into the practical utility-privacy tradeoffs of differential privacy mechanisms for SCPs. In this work, our primary focus is on establishing a rigorous theoretical foundation for differential privacy in the setting of Euclidean Jordan algebras, which represents a significant generalization beyond prior work in vector spaces. Given the mathematical novelty and generality of our results, as well as the broad range of potential SCP applications, we felt it was important to first lay down the theoretical groundwork and analyze sensitivity in this new setting.
We view empirical evaluation as a natural and promising direction for future work. Extending our theoretical results to practical implementations and benchmarking them on real or synthetic SCP instances, as suggested, would be a valuable addition to the literature, and we appreciate the reference to [MMSVV21] as a guiding example.
References
[MMSVV21] Medina, Muñoz, Syed, Vassilvitskii, and Viterick. Private optimization without constraint violations. AISTATS, 2021.
The submission provides a framework for perturbation and optimization algorithms in Euclidean Jordan Algebras (EJA). The main application of this idea is in the context of privately solving certain classes of conic programs, far beyond linear optimization. This problem is important, and not enough research has dived into these questions. The work provides an elegant framework for perturbation mechanisms, leveraging structural properties of EJA, in particular certain isometries with the standard Euclidean space.
This work obtains novel algorithms for privately solving SDPs, a question raised over 10 years ago in a work by Hsu et al.
There is major agreement on all reviewers that the contributions are significant, and therefore warrant publication in NeurIPS.