
A. System Dynamics and Features of Multi-Agent Systems
In this paper, an MAS consisting of Zagents moves in
a bounded environment S⊆R∣D∣, where Zdenotes the set
of the agents in the MAS, Zdenotes the cardinality of Z,
and D={d1, d2, ..., d∣D∣}with Dbeing the cardinality of
the set D. We represent the system dynamics of this MAS
in the finite discrete time domain T={1,2, ..., τ}(where
τ∈N={1,2, ...}) with Eq. (1).
s[t]=As[t−1]+Bu[t−1],(1)
where s[t]=[(s1[t])T,(s2[t])T, ..., (s∣Z∣[t])T]Tis the
vector of the states of the agents in the MAS at time
step tand si[t]=[si,d1[t], si,d2[t], ..., si,d∣D∣[t]]T(where
i∈Z) denotes the state of agent iat time step t;u[t−
1]=[(u1[t−1])T,(u2[t−1])T, ..., (u∣Z∣[t−1])T]Tis the
vector of the control inputs at time step t−1and ui[t−1]=
[ui,d1[t−1], ui,d2[t−1], ..., ui,d∣D∣[t−1]]Tis the control input
vector of agent iat time step t−1, and Aand Bare Z×Z
diagonal time-invariant matrices. The dynamics equation of
agent ican be expressed as si[t]=Ai∗si[t−1]+Bi∗ui[t−
1], where si[t]∈Sand ui[t−1]∈U={uu∞≤umax}for
all i∈Zand for all t∈T, and Ai∗and Bi∗refer to the i-th
row of matrix Aand B, respectively.
Definition 1. We define the system-level trajectory ηas a
function η∶T→Sto denote evolution of the average of
the states of all the agents in the MAS within a finite time
horizon defined in the discrete time domain Tand we define
η[t]∶=1
∣Z∣
∣Z∣
∑
i=1
si[t]. We also define the agent-level trajectory
sias a function si∶T→Sto denote the evolution of the
state of each agent iwithin a finite time horizon defined in
the discrete time domain T.
In this paper, we represent the topology of the MAS with
an undirected graph Gthat is time-invariant.
Definition 2. We denote an undirected graph by G=(C,E),
where C={c1, c2, ..., cnC}is a finite set of nodes, E=
{e1,2, e1,3, ..., e1,nE, e2,3, ..., enE−1,nE}is a finite set of edges,
and nC, nE∈N={1,2, ...}. In the set of edges E,ei,l
represents the edge that connects the nodes ciand cl.
Each node ciof the undirected graph Grepresents an agent
in the MAS. Each edge ei,l connecting the nodes iand l
represents the fact that agnets iand lare neighbors, i.e.,
agent iand lcommunicate with each other. Hereafter, we
denote the set of the neighboring agents of agent iwith Zi.
Also, we denote the adjacency matrix of the graph Gwith
D.
B. Differential Privacy
In this subsection, we review the theoretical framework of
differential privacy that we use in this paper [20] [21] [9]. To
apply differential privacy to protect the sensitive information
of each agent, we use the “input perturbation” approach, i.e.,
each agent adds noise to its state and then shares its noisy
output with its neighboring agents. Before formalizing the
definition of differential privacy, we explain the preliminary
definitions and notations related to differential privacy.
For a trajectory κi=si[0], si[1], ..., si[t], ..., where
si[t]=κi[t]∈R∣D∣for all t, we use the `pnorm as
κi`p∶=∞
∑
t=1si[t]p
p
1
p
, where .pis the ordinary p-norm
on Rd(d∈N∪{0}), and we define the set `d
p∶={κisi[t]∈
Rd,κ`p<∞}. Then, we define the truncation operator PQ
over trajectories κias follows: PQ(κi)=si[t]if t≤Q; and
P(κi)=0, otherwise. Now, we define the set ˜
`∣D∣
2as the set
of sequences of vectors in R∣D∣whose finite truncations are
all in `∣D∣
2(p=2and d=D). In other words, κi∈˜
`∣D∣
2if
and only if PQ(κi)∈`∣D∣
2for all Q∈N.
Definition 3. (Adjacency) For a fixed adjacency parameter
νi, the adjacency relation Aνi, for all κi, κ′
i∈˜
`∣D∣
2, is defined
as Eq. (2).
Aνi(κi, κ′
i)=
1,if κi−κ′
i`2≤νi
0,otherwise.(2)
In other words, two trajectories generated by agent iare
adjacent if the `2distance between the two is less or equal
to νi. Differential privacy is expected to make agent i’s true
trajectory, denoted by κi, indistinguishable from all other
trajectories contained in an `2-ball of radius νicentred at
the true trajectory κi.
We use a probability space (Ω,F,P)in order to state a
formal definition for differential privacy for dynamical sys-
tems which specifies the probabilistic guarantees of privacy.
For the formal definition of differential privacy mechanism
that we explain shortly, we assume that the outputs of the
mechanism is in ˜
`q
2and uses a σ-algebra over ˜
`q
2which is
denoted by Θq
2and the construction of Θq
2is explained in
[22].
Definition 4. ((i, δi)-Differential Privacy for Agent i)With
i>0and δi∈(0,1
2)for agent i, a mechanism M∶˜
`∣D∣
2×
Ω→˜
`q
2is (i, δi)-differentially private if for all adjacent
trajectories κi, κ′
i∈˜
`∣D∣
2and for all S∈Θq
2, we have the
following (Eq. (3)).
P[M(κi)∈S]≤eiP[M(κ′
i)∈S]+δi(3)
At each time step t, each agent ioutputs the value Ci∗yi[t],
where Ci∗is the i-th row of the Z×Ztime-invariant
diagonal matrix C. At time step t, for protecting the privacy
of agent i, noise must be added to its output yi[t]so an
adversary can not infer agent i’s trajectory κi[t]from its
output yi[t]. Calibrating the level of noise is done using
“sensitivity” of an agent’s output.
Definition 5. (Sensitivity for Input Perturbation Privacy)
The `2-norm sensitivity of agent i’s output map is the
greatest distance between two output trajectories ϑi=
yi[0], yi[1], ..., yi[t], ... and ϑ′
i=yi[0], yi[1], ..., yi[t], ...
defined as Eq. (4) for κi, κ′
i∈˜
`∣D∣
2.
∆`2ϑi∶=sup
κi,κ′
iCi∗κi−Ci∗κ′
i`2(4)