Randomized response, privacy, and Bayes theorem

blurred lights

Suppose you want to gather data on an incriminating question. For example, maybe a statistics professor would like to know how many students cheated on a test. Being a statistician, the professor has a clever way to find out what he wants to know while giving each student deniability.

Randomized response

Each student is asked to flip two coins. If the first coin comes up heads, the student answers the question truthfully, yes or no. Otherwise the student reports “yes” if the second coin came up heads and “no” it came up tails. Every student has deniability because each “yes” answer may have come from an innocent student who flipped tails on the first coin and heads on the second.

How can the professor estimate p, the proportion of students who cheated? Around half the students will get a head on the first coin and answer truthfully; the rest will look at the second coin and answer yes or no with equal probability. So the expected proportion of yes answers is Y = 0.5p + 0.25, and we can estimate p as 2Y – 0.5.

Database anonymization

The calculations above assume that everyone complied with the protocol, which may not be reasonable. If everyone were honest, there’d be no reason for this exercise in the first place. But we could imagine another scenario. Someone holds a database with identifiers and answers to a yes/no question. The owner of the database could follow the procedure above to introduce randomness in the data before giving the data over to someone else.

Information contained in a randomized response

What can we infer from someone’s randomized response to the cheating question? There’s nothing you can infer with certainty; that’s the point of introducing randomness. But that doesn’t mean that the answers contain no information. If we completely randomized the responses, dispensing with the first coin flip, then the responses would contain no information. The responses do contain information, but not enough to be incriminating.

Let C be a random variable representing whether someone cheated, and let R be their response, following the randomization procedure above. Given a response R = 1, what is the probability p that C = 1, i.e. that someone cheated? This is a classic application of Bayes’ theorem.

\begin{eqnarray*} P(C=1 \mid R = 1) &=& \frac{P(R=1 \mid C=1) P(C=1)}{P(R=1\mid C=1)P(C=1) + P(R=1\mid C=0)P(C=0)} \\ &=& \frac{\frac{3}{4} p}{\frac{3}{4} p + \frac{1}{4}(1-p)} \\ &=& \frac{3p}{2p+1} \end{eqnarray*}

If we didn’t know someone’s response, we would estimate their probability of having cheated as p, the group average. But knowing that their response was “yes” we update our estimate to 3p / (2p + 1). At the extremes of p = 0 and p = 1 these coincide. But for any value of p strictly between 0 and 1, our estimate goes up. That is, the probability that someone cheated, conditional on knowing they responded “yes”, is higher than the unconditional probability. In symbols, we have

P(C = 1 | R = 1) > P(C = 1)

when 0 < < 1. The difference between the left and right sides above is maximized when p = (√3 – 1)/2 = 0.366. That is, a “yes” response tells us the most when about 1/3 of the students cheated. When p = 0.366, P(= 1 | R= 1) = 0.634, i.e. the posterior probability is almost twice the prior probability.

You could go through a similar exercise with Bayes theorem to show that P(C = 1 | R = 0) = p/(3 – 2p), which is less than p provided 0 < p < 1. So if someone answers “yes” to cheating, that does make it more likely that the actually cheated, but not so much more that you can justly accuse them of cheating. (Unless p = 1, in which case you’re in the realm of logic rather than probability: if everyone cheated, then you can conclude that any individual cheated.)

Update: See the next post for a more general randomization scheme and more about the trade-off between privacy and utility. The post after that gives an overview of randomization for more general kinds of data.

If you would like help with database de-identification, please let me know.

4 thoughts on “Randomized response, privacy, and Bayes theorem

  1. This is a generative model, where

    z[n] ~ bernoulli(theta) // cheating status of student n
    u1[n] ~ bernoulli(0.5) // first coin flip of student n
    u2[n] ~ bernoulli(0.5) // second coin flip of student n
    y[n] = u1[n] ? u2[n] : z[n] // response of student n

    Then you get a likelihood

    p(y[n], u1[n], u2[n], z[n] | theta)
    = bernoulli(z[n] | theta)
    * bernoulli(u1[n] | 0.5)
    * bernoulli(u2[n] | 0.5)
    * I[ y[n] == (u1[n] ? u2[n] : z[n]) ]

    and complete data marginal likelihod (assuming independence of student cheating status given theta),

    p(y | theta)
    = PRODUCT_n SUM_v1 SUM_v2 SUM_z p(y[n], v1, v2, z | theta)

    And here’s a little Stan program to compute the posterior for theta, assuming a uniform prior on theta in (0, 1):

    data {
    int N;
    int y[N];
    }
    parameters {
    real theta;
    }
    model {
    for (n in 1:N)
    target += log_mix(0.5,
    bernoulli_lpmf(y[n] | 0.5),
    bernoulli_lpmf(y[n] | theta));
    }

    And some test code:

    N <- 200
    p <- 0.25
    u1 <- rbinom(N, 1, 0.5)
    u2 <- rbinom(N, 1, 0.5)
    z <- rbinom(N, 1, p)
    y <- rep(N, 0);
    for (n in 1:N) y[n] <- ifelse(u1[n], u2[n], z[n])

    fit <- stan("anon-cheat.stan", data = list(N = N, y = y));

    Hope this comment client supports the pre-tag in HTML! If not, sorry for the inevitable garbling.

  2. Oops, should’ve also mentioned that I coded this for generality, not for efficiency. In this case, N and sum(y) are sufficient statistics that could be used to code this problem much more efficiently. In fact, it should be analytically solvable with a uniform prior—it’d just be the Bayesian equivalent of John’s analysis above.

    Also, neat problem—hadn’t seen this before.

    I was expecting you to go through the mutual information calculation for y (observation) and z (cheating status). Of course, this will depend on p, but can be estimated along with theta.

Leave a Reply

Your email address will not be published. Required fields are marked *