Recognition: unknown
Modular Verification of Differential Privacy in Probabilistic Higher-Order Separation Logic (Extended Version)
Pith reviewed 2026-05-10 13:47 UTC · model grok-4.3
The pith
A separation logic treats privacy budgets as first-class resources to enable modular verification of complex differentially private programs.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that a probabilistic higher-order separation logic with privacy budgets as resources can verify differentially private programs modularly, including those using randomization, local state, and higher-order functions, and that this logic is sound with respect to the standard definition of differential privacy.
What carries the argument
Probabilistic higher-order separation logic in which privacy budgets are modeled as separation logic resources that compose via the separating conjunction, supporting modular specifications for primitives and combinators.
If this is right
- Specifications for library primitives and combinators can be instantiated to verify clients that use them.
- Privacy filters that track and enforce budgets across multiple queries can be verified while handling randomization and local state.
- An online version of the Sparse Vector Technique can be given a modular, reusable specification.
- Higher-order functions that implement interactive differentially private algorithms become amenable to compositional verification.
Where Pith is reading between the lines
- The same resource-based treatment of budgets could be adapted to verify other quantitative properties such as expected error bounds in addition to privacy.
- The logic's support for local state and higher-order code suggests it could be used to verify differentially private implementations inside existing general-purpose libraries rather than only standalone mechanisms.
- Because the logic is foundationally verified, its rules could serve as a basis for automated or semi-automated checkers for new differentially private algorithms.
Load-bearing premise
The new separation logic rules are sound with respect to the standard definition of differential privacy and correctly model the semantics of the higher-order probabilistic language with state.
What would settle it
A concrete program that the logic certifies as satisfying a differential privacy specification but that can be shown to violate the standard epsilon-delta guarantee on some input distribution.
Figures
read the original abstract
Differential privacy is the standard method for privacy-preserving data analysis. The importance of having strong guarantees on the reliability of implementations of differentially private algorithms is widely recognized and has sparked fruitful research on formal methods. However, the design patterns and language features used in modern DP libraries as well as the classes of guarantees that the library designers wish to establish often fall outside of the scope of previous verification approaches. We introduce a program logic suitable for verifying differentially private implementations written in complex, general-purpose programming languages. Our logic has first-class support for reasoning about privacy budgets as a separation logic resource. The expressiveness of the logic and the target language allow our approach to handle common programming patterns used in the implementation of libraries for differential privacy, such as privacy filters and caching. While previous work has focused on developing guarantees for programs written in domain-specific languages or for privacy mechanisms in isolation, our logic can reason modularly about primitives, higher-order combinators, and interactive algorithms. We demonstrate the applicability of our approach by implementing a verified library of differential privacy mechanisms, including an online version of the Sparse Vector Technique, as well as a privacy filter inspired by the popular Python library OpenDP, which crucially relies on our ability to handle the combination of randomization, local state, and higher-order functions. We demonstrate that our specifications are general and reusable by instantiating them to verify clients of our library. All of our results have been foundationally verified in the Rocq Prover.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces a probabilistic higher-order separation logic for modular verification of differential privacy in general-purpose languages with state and higher-order functions. Privacy budgets are treated as first-class separation logic resources, enabling reasoning about DP primitives, higher-order combinators, interactive algorithms, privacy filters, and caching. The approach is demonstrated via a verified library including an online Sparse Vector Technique and an OpenDP-inspired privacy filter; all results, including library and client verifications, are machine-checked in the Rocq Prover.
Significance. If the soundness result holds, the work substantially advances DP verification by supporting complex library patterns and language features outside the scope of prior domain-specific or mechanism-isolated approaches. The foundational Rocq formalization against external semantic models supplies machine-checked evidence for the logic rules, reusable specifications, and modeling of randomization plus local state, which strengthens the central claims.
minor comments (2)
- [Introduction] The abstract states that the logic handles 'privacy filters and caching' but the introduction of the privacy filter example could more explicitly note which separation-logic rule (e.g., the resource-splitting rule for budgets) is used to discharge the filter's state update.
- [Logic Definition] Notation for the privacy-budget resource (denoted with a separating conjunction) is introduced without a small example derivation in the main text; a one-line derivation showing budget consumption for a single Laplace mechanism would improve readability.
Simulated Author's Rebuttal
We thank the referee for their positive summary of our work and their recommendation to accept the paper. No major comments were raised in the report.
Circularity Check
No significant circularity
full rationale
The paper defines a new separation logic for modular verification of differential privacy properties in a higher-order probabilistic language with state. Its central claims rest on the soundness of the logic rules with respect to the standard definition of differential privacy and the language semantics. These properties are established via an independent, machine-checked formalization in the Rocq Prover against external semantic models, rather than by construction, fitted parameters, or self-referential definitions. No load-bearing steps reduce to self-citations, ansatzes smuggled via prior work, or renaming of known results; the derivation chain is self-contained with external verification.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Standard axioms and rules of higher-order separation logic and probabilistic semantics
invented entities (1)
-
Privacy budget as a first-class separation logic resource
no independent evidence
Reference graph
Works this paper leans on
-
[1]
Approximate Relational Reasoning for Higher-Order Probabilistic Programs.Proc. ACM Program. Lang.9, POPL, Article 41 (Jan. 2025), 31 pages. https://doi.org/10.1145/3704877 Philipp G. Haselwarter, Kwing Hei Li, Markus de Medeiros, Simon Oddershede Gregersen, Alejandro Aguirre, Joseph Tassarotti, and Lars Birkedal. 2024. Tachis: Higher-Order Separation Logi...
-
[2]
VLDB Endow.12, 11 (July 2019), 1371–1384
PrivateSQL: A Differentially Private SQL Query Engine.Proc. VLDB Endow.12, 11 (July 2019), 1371–1384. https://doi.org/10.14778/3342263.3342274 Elisabet Lobo-Vesga, Alejandro Russo, and Marco Gaboardi. 2020. A Programming Framework for Differential Privacy with Accuracy Concentration Bounds. In2020 IEEE Symposium on Security and Privacy (SP). 411–428. http...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.