Single-Order RDP Privacy Regions
- The paper introduces single-order RDP privacy regions as optimal privacy-utility trade-offs characterized by bounding Rényi divergence at a fixed order.
- It reveals that these regions are convex, symmetric, and extremally achieved by two-point mechanisms, simplifying privacy comparisons.
- The work underpins efficient black-box conversions to f-DP and (ε,δ)-DP, impacting posterior sampling, subsampled Gaussian, and shuffle mechanism analyses.
A single-order RDP privacy region is the locus of optimal privacy-utility trade-offs determined by a mechanism’s Rényi Differential Privacy (RDP) guarantees at a fixed divergence order. It encodes the hypothesis-testing region—specifically, the attainable Type I and II error pairs—imposed by bounding RDP at a particular order and level. The theory of single-order RDP privacy regions provides both a geometric and an operational understanding of how moment-based privacy guarantees constrain statistical distinguishability, and establishes their role as the foundational building blocks in black-box conversions from RDP to more general hypothesis testing (e.g., -DP) or classical -DP frameworks.
1. Definition and Characterization of Single-Order RDP Privacy Regions
Let denote the Rényi order and the upper bound on the Rényi divergence. For every pair of adjacent databases, a mechanism is said to satisfy -RDP if
where and are the output distributions under neighboring datasets. In the context of hypothesis testing, for every possible rejection region , one considers the induced Type I and II errors:
The -order RDP privacy region is
The lower boundary of this region, parameterized by , is the trade-off function :
For , explicit analytic constraints are given by:
with analogous forms for (KL-divergence) and (inequalities reverse).
2. Geometric and Structural Properties
The privacy region is always convex and symmetric about the line . The map is affine, and the Rényi divergence sublevel sets are convex in distribution space. Symmetry arises because the constraints are invariant under swapping the roles of and . The fundamental result is that every boundary point of is realized by a two-point (randomized response) mechanism, highlighting the sufficiency of binary mechanisms for extremal trade-offs and simplifying the analysis of attainable regions (Riess et al., 4 Feb 2026).
3. Role in Black-box Conversions and Optimality
The intersection of single-order RDP privacy regions across all , given an RDP profile , yields the tightest hypothesis-testing guarantee (in the -DP sense) derivable solely from RDP accountants. More precisely, the attainable region is
and the corresponding lower boundary is:
Any black-box method for converting RDP guarantees to -DP (or -DP) trade-offs cannot uniformly improve upon . This optimality is universal and holds in the Blackwell sense (Riess et al., 4 Feb 2026). The result marks the mathematical limit of RDP-to--DP conversion without knowledge of the internal mechanism.
4. Computational Aspects and Applications
Single-order privacy regions reduce the process of privacy accounting to computing explicit trade-off curves , which are then combined pointwise over . This avoids complex variational calculus or loose union bounds. In practical privacy analysis workflows, the procedure is:
- Evaluate (numerically or analytically) for a grid of values.
- Take the pointwise maximum to obtain .
- For -DP conversion, many standard envelopes admit closed-form or efficient numerical evaluation (Mironov, 2017, Koskela et al., 2024).
This approach directly underpins privacy analysis in mechanisms such as:
- Posterior sampling in Bayesian models, where the impact of the prior and data sensitivity is fully described by the single-order privacy region (Geumlek et al., 2017).
- Subsampled mechanisms and analytical moments accountants for mechanisms such as the Subsampled Gaussian Mechanism (Wang et al., 2018, Mironov et al., 2019).
- Shuffle models, where the privacy region informs both the privacy amplification attained under shuffling and the comparison to the central model (Liew et al., 2022).
5. Examples: Mechanisms and Single-Order Curves
In exponential-family posterior sampling, the achievable points trace out a curve with vertical asymptotes determined by the prior; as the prior strengthens, the privacy region broadens and decreases. In the sampled Gaussian mechanism, the region is approximately linear: for small sampling rate and large scale (Mironov et al., 2019). For shuffle mechanisms, single-order regions show a strict gain over the standard central Gaussian mechanism, with the RDP curve lying well below the corresponding non-shuffled bound (Liew et al., 2022).
6. Theoretical and Practical Implications
The geometric structure of single-order RDP privacy regions explains why two-point mechanisms are extremal and why cumulant-based summaries (as in moments accountants) are sufficient for privacy composition (Riess et al., 4 Feb 2026). For practitioners, these regions provide both auditing tools (e.g., verifying claims of -DP or -DP) and a pathway to arbitrarily tight numerical evaluation across complex mechanism compositions (Koskela et al., 2024).
Furthermore, the explicit region characterizes the tradeoff between privacy cost and robustness with respect to higher-order moments, facilitating informed choices along the privacy-utility frontier for specific application requirements.
7. Extensions and Future Directions
Recent developments explore:
- Generalization to hypothesis testing beyond binary decisions and to -DP with arbitrary trade-off functions.
- Direct profile accounting in large-scale and adaptive mechanisms (e.g., private selection, hyperparameter tuning), where single-order profiles enable substantial improvement over traditional RDP accounting by avoiding conversion-induced slack (Koskela et al., 2024).
- Adaptive privacy accounting for parallel or data-dependent mechanisms, leveraging the modularity of single-order regions.
A plausible implication is that future mechanism designs may further exploit the modularity and tightness of single-order privacy regions, particularly in interactive or federated settings where compositions and privacy amplification effects are subtle and intricate.
References
- "Optimal conversion from Rényi Differential Privacy to -Differential Privacy" (Riess et al., 4 Feb 2026)
- "Subsampled Rényi Differential Privacy and Analytical Moments Accountant" (Wang et al., 2018)
- "Rényi Differential Privacy Mechanisms for Posterior Sampling" (Geumlek et al., 2017)
- "Privacy Profiles for Private Selection" (Koskela et al., 2024)
- "Shuffle Gaussian Mechanism for Differential Privacy" (Liew et al., 2022)
- "Rényi Differential Privacy of the Sampled Gaussian Mechanism" (Mironov et al., 2019)
- "Renyi Differential Privacy" (Mironov, 2017)