Affiliation:
1. IMDEA Software Institue, Madrid, Spain
2. University of Dundee, Dundee, Scotland Uk
3. University of Pennsylvania, Philadelphia, PA, USA
4. IMDEA Software Institute, Madrid, Spain
Abstract
Mechanism design is the study of algorithm design where the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property, incentive properties are only useful if the strategic agents also believe this fact.
Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals.
We introduce a relational refinement type system, called HOARe2, for verifying mechanism design and differential privacy. We show that HOARe2 is sound w.r.t. a denotational semantics, and correctly models (epsilon,delta)-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of HOARe2 and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy.
Funder
Seventh Framework Programme
Division of Computer and Network Systems
Ministerio de Economía y Competitividad
Fundación Caja Madrid
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design,Software
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Group and Attack: Auditing Differential Privacy;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. SEAL: Capability-Based Access Control for Data-Analytic Scenarios;Proceedings of the 28th ACM Symposium on Access Control Models and Technologies;2023-05-24
3. Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs;Journal of Automated Reasoning;2019-07-31
4. Encrypted Databases for Differential Privacy;Proceedings on Privacy Enhancing Technologies;2019-07-01
5. Model Checking Differentially Private Properties;Programming Languages and Systems;2018