Optimal e-variables under constraints
Pith reviewed 2026-05-09 21:00 UTC · model grok-4.3
The pith
Log-optimal e-variables under constraints are obtained by transforming the unconstrained optimum.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper establishes that under constraints including differential privacy, quantization, boundedness, or moment restrictions, log-optimal constrained e-variables can be constructed by first computing the unconstrained log-optimal e-variable given by the likelihood ratio of the least favorable distributions, then imposing the constraint via an appropriate transformation. Thus, the constrained growth-rate optimization problem does not require solving for a different pair of least favorable distributions; the constrained optimal solution is just a post-processing of the unconstrained optimal solution.
What carries the argument
The optimize-then-constrain principle, which starts with the likelihood ratio of the least favorable distributions and applies a transformation to meet the added requirement while preserving log-optimality.
If this is right
- The same least favorable distributions used without constraints remain the starting point even after constraints are added.
- Existing methods for computing unconstrained e-variables can be reused directly before applying the transformation.
- The approach covers differential privacy, quantization, boundedness, and moment restrictions without separate derivations.
- The growth rate achieved by the constrained e-variable is determined by the original unconstrained optimum after the transformation.
- No new optimization over pairs of distributions is needed when the constraint is imposed.
Where Pith is reading between the lines
- The principle could extend to other structural constraints not examined in the paper.
- Similar post-processing ideas might simplify constrained versions of related quantities in robust statistics.
- Numerical checks on concrete examples could identify the explicit transformations for each constraint type.
- The result suggests that anytime-valid procedures can incorporate privacy or boundedness requirements more readily.
Load-bearing premise
That an appropriate transformation exists for each listed constraint which preserves log-optimality without requiring a different pair of least favorable distributions.
What would settle it
Finding one of the listed constraints, such as differential privacy, for which the transformed unconstrained optimum is not the true log-optimal constrained e-variable would disprove the central claim.
read the original abstract
E-variables enable safe and anytime-valid inference, with log-optimal e-variables given by the likelihood ratio of the least favorable distributions (LFDs) when they exist in composite settings. While this unconstrained theory is well understood, one may need/wish to impose additional structural constraints, including differential privacy, quantization, boundedness, or moment restrictions. We show that under these constraints, log-optimal constrained e-variables can often be constructed by a simple \emph{optimize-then-constrain} principle: first compute the unconstrained log-optimal e-variable, then impose the constraint via an appropriate transformation. Thus, the constrained growth-rate optimization problem does not require solving for a different LFD pair; the constrained optimal solution is just a post-processing of the unconstrained optimal solution.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims that log-optimal constrained e-variables under structural constraints (differential privacy, quantization, boundedness, moment restrictions) can be obtained via an 'optimize-then-constrain' principle: compute the unconstrained log-optimal e-variable as the likelihood ratio of the least favorable distributions (LFDs), then apply a suitable post-processing transformation T to enforce the constraint while preserving the e-variable property and the maximal growth rate E_Q[log T(E)]. The constrained optimization thus does not require solving for a new LFD pair.
Significance. If the central claim holds with explicit constructions and proofs for the listed constraints, the result would simplify construction of constrained e-variables by reusing unconstrained LFD theory and transformations, enabling practical anytime-valid inference in privacy-preserving, quantized, or bounded settings without re-deriving saddle points. It builds directly on established LFD concepts from prior literature rather than introducing new free parameters or self-referential definitions.
major comments (2)
- [Abstract] Abstract and introduction: The 'optimize-then-constrain' principle is asserted to work for differential privacy, quantization, boundedness, and moment restrictions, but the manuscript must explicitly verify (via derivation or counterexample check) that for each constraint the transformation T simultaneously satisfies E_P[T(E)] ≤ 1, meets the constraint, and achieves the maximal growth rate without the supporting LFD pair changing. The skeptic concern is that some constraints may alter the feasible set enough to shift the saddle point of the growth-rate game, requiring a different LFD pair; this needs to be addressed with a concrete check for at least the DP and moment-restriction cases.
- [Introduction / main claim] The central derivation relies on the axiom that 'the constrained optimization problem admits a solution that is a transformation of the unconstrained solution.' This needs to be proven or shown to hold under the paper's assumptions rather than taken as given, especially since the full details of the transformations and their preservation of log-optimality are not verifiable from the abstract alone.
minor comments (1)
- Clarify notation for the transformation T and the constrained growth-rate objective in the main text to avoid ambiguity with the unconstrained case.
Simulated Author's Rebuttal
Thank you for the referee's constructive feedback. We respond to the major comments point by point below. We agree that strengthening the explicit verifications will benefit the manuscript.
read point-by-point responses
-
Referee: [Abstract] Abstract and introduction: The 'optimize-then-constrain' principle is asserted to work for differential privacy, quantization, boundedness, and moment restrictions, but the manuscript must explicitly verify (via derivation or counterexample check) that for each constraint the transformation T simultaneously satisfies E_P[T(E)] ≤ 1, meets the constraint, and achieves the maximal growth rate without the supporting LFD pair changing. The skeptic concern is that some constraints may alter the feasible set enough to shift the saddle point of the growth-rate game, requiring a different LFD pair; this needs to be addressed with a concrete check for at least the DP and moment-restriction cases.
Authors: We appreciate the referee pointing out the need for more explicit verification to address potential concerns about shifts in the LFDs. The manuscript derives the post-processing transformations for each listed constraint and shows that they preserve both the e-variable property and the maximal growth rate using the original LFD pair. This is because the transformations are designed to be applied after computing the likelihood ratio, and the expectation under the null remains bounded by 1 while the growth rate is not reduced. To directly address the skeptic concern, we will add a new subsection with concrete derivations and checks for the differential privacy and moment restriction cases, demonstrating that the saddle point does not change. revision: yes
-
Referee: [Introduction / main claim] The central derivation relies on the axiom that 'the constrained optimization problem admits a solution that is a transformation of the unconstrained solution.' This needs to be proven or shown to hold under the paper's assumptions rather than taken as given, especially since the full details of the transformations and their preservation of log-optimality are not verifiable from the abstract alone.
Authors: We clarify that the manuscript does not treat this as an unproven axiom but establishes it through a general argument applicable to the considered constraint classes. The key is that for these structural constraints, there exists a transformation T that maps the unconstrained optimal e-variable to a constrained one without loss of optimality. The full proof and details of T are provided in the body of the paper. Since the abstract is necessarily concise, we will revise the introduction to include a brief proof outline and better signpost the relevant sections where the preservation of log-optimality is shown. revision: yes
Circularity Check
No significant circularity; derivation builds on independent LFD theory
full rationale
The paper's central result is a construction principle showing that constrained log-optimal e-variables are obtained via post-processing transformations applied to the unconstrained log-optimal e-variable (likelihood ratio of LFD pair). This is framed as a theorem to be proven for listed constraints, not a definitional equivalence or fitted parameter renamed as prediction. The unconstrained LFD theory is described as 'well understood' from prior literature without load-bearing self-citations that reduce the claim to unverified author work. No self-definitional steps, ansatz smuggling, or renaming of known results appear in the provided derivation outline. The argument remains externally falsifiable via the growth-rate optimization and e-variable properties.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption Existence of least favorable distributions (LFDs) that achieve the unconstrained log-optimal e-variable
- ad hoc to paper The constrained optimization problem admits a solution that is a transformation of the unconstrained solution
Reference graph
Works this paper leans on
-
[1]
International conference on machine learning , pages=
The composition theorem for differential privacy , author=. International conference on machine learning , pages=. 2015 , organization=
work page 2015
-
[2]
Journal of Machine Learning Research , volume=
Extremal mechanisms for local differential privacy , author=. Journal of Machine Learning Research , volume=
-
[3]
Duchi, John C. and Jordan, Michael I. and Wainwright, Martin J. , booktitle=. Local Privacy and Statistical Minimax Rates , year=
-
[4]
The algorithmic foundations of differential privacy , author=. Foundations and trends. 2014 , publisher=
work page 2014
-
[5]
IEEE Transactions on Information Theory , year=
Huber-robust likelihood ratio tests for composite nulls and alternatives , author=. IEEE Transactions on Information Theory , year=
-
[6]
International Conference on Artificial Intelligence and Statistics , pages=
Huber-robust confidence sequences , author=. International Conference on Artificial Intelligence and Statistics , pages=. 2023 , organization=
work page 2023
-
[7]
Challenging the empirical mean and empirical variance: a deviation study , author=. Annales de l'IHP Probabilit
-
[8]
Time-uniform, nonparametric, nonasymptotic confidence sequences , author=. Annals of Statistics , year=
-
[9]
Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability , year=
Optimal gambling systems for favorable games , author=. Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability , year=
-
[10]
The Bell System Technical Journal , volume=
A new interpretation of information rate , author=. The Bell System Technical Journal , volume=
-
[11]
Game-theoretic foundations for probability and finance , author=. 2019 , publisher=
work page 2019
-
[12]
The Annals of Mathematical Statistics , volume=
Statistical methods related to the law of the iterated logarithm , author=. The Annals of Mathematical Statistics , volume=. 1970 , publisher=
work page 1970
-
[13]
The Annals of Mathematical Statistics , pages=
A robust version of the probability ratio test , author=. The Annals of Mathematical Statistics , pages=. 1965 , publisher=
work page 1965
- [14]
- [15]
-
[16]
The Annals of Mathematical Statistics , volume=
Sequential Tests of Statistical Hypotheses , author=. The Annals of Mathematical Statistics , volume=. 1945 , publisher=
work page 1945
-
[17]
Journal of the Royal Statistical Society Series B: Statistical Methodology , year=
Safe testing , author=. Journal of the Royal Statistical Society Series B: Statistical Methodology , year=
-
[18]
Game-theoretic statistics and safe anytime-valid inference , author=. Statistical Science , year=
-
[19]
The Annals of Statistics , pages=
Robust sequential testing , author=. The Annals of Statistics , pages=. 1985 , publisher=
work page 1985
-
[20]
Contributions to probability and statistics , pages=
A survey of sampling from contaminated distributions , author=. Contributions to probability and statistics , pages=. 1960 , publisher=
work page 1960
-
[21]
The Annals of Mathematical Statistics , pages=
Robust Estimation of a Location Parameter , author=. The Annals of Mathematical Statistics , pages=. 1964 , publisher=
work page 1964
- [22]
-
[23]
Rejection of outliers , author=. Technometrics , volume=. 1960 , publisher=
work page 1960
-
[24]
The Annals of Mathematical Statistics , pages=
On some robust estimates of location , author=. The Annals of Mathematical Statistics , pages=. 1965 , publisher=
work page 1965
-
[25]
International Conference on Machine Learning , pages=
Minimax m-estimation under adversarial contamination , author=. International Conference on Machine Learning , pages=. 2022 , organization=
work page 2022
-
[26]
Journal of the american statistical association , volume=
The influence curve and its role in robust estimation , author=. Journal of the american statistical association , volume=. 1974 , publisher=
work page 1974
-
[27]
Stochastic Processes and Their Applications , volume=
Catoni-style confidence sequences for heavy-tailed mean estimation , author=. Stochastic Processes and Their Applications , volume=. 2023 , publisher=
work page 2023
-
[28]
The complexity of massive data set computations , author=. PhD thesis , year=
-
[29]
International Conference on Artificial Intelligence and Statistics , pages=
Robust hypothesis testing and distribution estimation in hellinger distance , author=. International Conference on Artificial Intelligence and Statistics , pages=. 2021 , organization=
work page 2021
-
[30]
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing , pages=
The structure of optimal private tests for simple hypotheses , author=. Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing , pages=
-
[31]
The Annals of Mathematical Statistics , volume=
Asymptotic properties of non-linear least squares estimators , author=. The Annals of Mathematical Statistics , volume=. 1969 , publisher=
work page 1969
-
[32]
Admissible anytime-valid sequential inference must rely on nonnegative martingales , author=. arXiv preprint arXiv:2009.03167 , year=
-
[33]
International Journal of Approximate Reasoning , volume=
Testing exchangeability: Fork-convexity, supermartingales and e-processes , author=. International Journal of Approximate Reasoning , volume=. 2022 , publisher=
work page 2022
-
[34]
Journal of the Royal Statistical Society Series A: Statistics in Society , volume=
Testing by betting: A strategy for statistical and scientific communication , author=. Journal of the Royal Statistical Society Series A: Statistics in Society , volume=. 2021 , publisher=
work page 2021
-
[35]
Howard, Steven R and Ramdas, Aaditya and McAuliffe, Jon and Sekhon, Jasjeet , journal=. Time-uniform
-
[36]
Etude critique de la notion de collectif , author=. Bull. Amer. Math. Soc , volume=
-
[37]
Always valid inference: Continuous monitoring of
Johari, Ramesh and Koomen, Pete and Pekelis, Leonid and Walsh, David , journal=. Always valid inference: Continuous monitoring of. 2022 , publisher=
work page 2022
-
[38]
Proceedings of the National Academy of Sciences , volume=
Some nonparametric sequential tests with power one , author=. Proceedings of the National Academy of Sciences , volume=. 1968 , publisher=
work page 1968
-
[39]
The Annals of Statistics , number =
Martin Larsson and Aaditya Ramdas and Johannes Ruf , title =. The Annals of Statistics , number =. 2025 , doi =
work page 2025
-
[40]
Proceedings of the National Academy of Sciences , volume=
Universal inference , author=. Proceedings of the National Academy of Sciences , volume=. 2020 , publisher=
work page 2020
-
[41]
Journal of the Royal Statistical Society Series B (Methodology), with discussion , year=
Estimating means of bounded random variables by betting , author=. Journal of the Royal Statistical Society Series B (Methodology), with discussion , year=
-
[42]
International Conference on Artificial Intelligence and Statistics , pages=
Testing exchangeability by pairwise betting , author=. International Conference on Artificial Intelligence and Statistics , pages=. 2024 , organization=
work page 2024
- [43]
-
[44]
Advances in Neural Information Processing Systems , volume=
Confidence sequences for sampling without replacement , author=. Advances in Neural Information Processing Systems , volume=
- [45]
-
[46]
Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability , volume=
The behavior of maximum likelihood estimates under nonstandard conditions , author=. Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability , volume=. 1967 , organization=
work page 1967
- [47]
-
[48]
Gambling Research: Gambling and Risk Taking,
Log optimal portfolios , author=. Chapter in “Gambling Research: Gambling and Risk Taking,” Seventh International Conference , volume=
-
[49]
IEEE Transactions of Information Theory , year=
Reverse information projections and optimal e-statistics , author=. IEEE Transactions of Information Theory , year=
-
[50]
Agrawal, Shubhada and Mathieu, Timoth\'ee and Basu, Debabrota and Maillard, Odalric-Ambrym , booktitle =. 2024 , volume =
work page 2024
-
[51]
Robust hypothesis testing using
Gao, Rui and Xie, Liyan and Xie, Yao and Xu, Huan , journal=. Robust hypothesis testing using
-
[52]
IEEE Transactions on Information Theory , volume=
Kernel robust hypothesis testing , author=. IEEE Transactions on Information Theory , volume=. 2023 , publisher=
work page 2023
-
[53]
A data-driven approach to robust hypothesis testing using
Wang, Jie and Xie, Yao , booktitle=. A data-driven approach to robust hypothesis testing using. 2022 , organization=
work page 2022
-
[54]
Robust hypothesis testing with moment constrained uncertainty sets , author=. ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) , pages=. 2023 , organization=
work page 2023
-
[55]
Post-detection inference for sequential changepoint localization
Post-detection inference for sequential changepoint localization , author=. arXiv preprint arXiv:2502.06096 , year=
work page internal anchor Pith review Pith/arXiv arXiv
-
[56]
The New England Journal of Statistics in Data Science , volume =
Jaehyeok Shin and Aaditya Ramdas and Alessandro Rinaldo , title =. The New England Journal of Statistics in Data Science , volume =. 2023 , pages =
work page 2023
-
[57]
Foundations and Trends in Statistics , volume =
Hypothesis testing with e-values , author=. Foundations and Trends in Statistics , volume =
-
[58]
IEEE Transactions on Information Theory , volume=
Robust decision design using a distance criterion , author=. IEEE Transactions on Information Theory , volume=. 1980 , publisher=
work page 1980
-
[59]
Huber, Peter J and Strassen, Volker , journal=. Minimax tests and the. 1973 , publisher=
work page 1973
-
[60]
IEEE Transactions on Information Theory , volume=
Decentralized sequential detection with a fusion center performing the sequential test , author=. IEEE Transactions on Information Theory , volume=. 1993 , publisher=
work page 1993
- [61]
-
[62]
SIAM Journal on Computing , volume=
What can we learn privately? , author=. SIAM Journal on Computing , volume=. 2011 , publisher=
work page 2011
-
[63]
arXiv preprint arXiv:2510.18654 , year=
Differentially Private E-Values , author=. arXiv preprint arXiv:2510.18654 , year=
-
[64]
IEEE Transactions on Information Theory , volume=
Simple binary hypothesis testing under local differential privacy and communication constraints , author=. IEEE Transactions on Information Theory , volume=. 2024 , publisher=
work page 2024
-
[65]
Minimax optimal goodness-of-fit testing for densities and multinomials under a local differential privacy constraint , author=. Bernoulli , volume=. 2022 , publisher=
work page 2022
-
[66]
arXiv preprint arXiv:2411.09064 , year=
Minimax Optimal Two-Sample Testing under Local Differential Privacy , author=. arXiv preprint arXiv:2411.09064 , year=
-
[67]
Theory of cryptography conference , pages=
Calibrating noise to sensitivity in private data analysis , author=. Theory of cryptography conference , pages=. 2006 , organization=
work page 2006
-
[68]
International conference on machine learning , pages=
Differentially private chi-squared hypothesis testing: Goodness of fit and independence testing , author=. International conference on machine learning , pages=. 2016 , organization=
work page 2016
-
[69]
Proceedings of the 31st Conference On Learning Theory , pages =
Geometric Lower Bounds for Distributed Parameter Estimation under Communication Constraints , author =. Proceedings of the 31st Conference On Learning Theory , pages =. 2018 , editor =
work page 2018
-
[70]
Advances in Neural Information Processing Systems , volume=
Pointwise bounds for distribution estimation under communication constraints , author=. Advances in Neural Information Processing Systems , volume=
-
[71]
IEEE Transactions on Information Theory , volume=
Communication-constrained hypothesis testing: Optimality, robustness, and reverse data processing inequalities , author=. IEEE Transactions on Information Theory , volume=. 2023 , publisher=
work page 2023
-
[72]
arXiv preprint arXiv:2409.05654 , year=
Continuous testing: Unifying tests and e-values , author=. arXiv preprint arXiv:2409.05654 , year=
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.