pith. sign in

arxiv: 2604.21680 · v1 · submitted 2026-04-23 · 📊 stat.ME

Optimal e-variables under constraints

Pith reviewed 2026-05-09 21:00 UTC · model grok-4.3

classification 📊 stat.ME
keywords e-variableslog-optimalityconstrained optimizationdifferential privacyanytime-valid inferenceleast favorable distributionsgrowth rate optimization
0
0 comments X

The pith

Log-optimal e-variables under constraints are obtained by transforming the unconstrained optimum.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

E-variables provide a way to perform statistical inference that stays valid no matter when the data stream stops. The paper shows that when extra requirements are added, such as privacy protections or limits on how large the values can be, the best possible e-variable satisfying those requirements is still built from the one that would be best without them. One first identifies the unconstrained optimum as the likelihood ratio between the least favorable distributions, then applies a transformation that enforces the new requirement. This avoids having to search for entirely new least favorable distributions that fit the constraints. A reader would care because it turns a potentially difficult constrained search into a straightforward post-processing step.

Core claim

The paper establishes that under constraints including differential privacy, quantization, boundedness, or moment restrictions, log-optimal constrained e-variables can be constructed by first computing the unconstrained log-optimal e-variable given by the likelihood ratio of the least favorable distributions, then imposing the constraint via an appropriate transformation. Thus, the constrained growth-rate optimization problem does not require solving for a different pair of least favorable distributions; the constrained optimal solution is just a post-processing of the unconstrained optimal solution.

What carries the argument

The optimize-then-constrain principle, which starts with the likelihood ratio of the least favorable distributions and applies a transformation to meet the added requirement while preserving log-optimality.

If this is right

  • The same least favorable distributions used without constraints remain the starting point even after constraints are added.
  • Existing methods for computing unconstrained e-variables can be reused directly before applying the transformation.
  • The approach covers differential privacy, quantization, boundedness, and moment restrictions without separate derivations.
  • The growth rate achieved by the constrained e-variable is determined by the original unconstrained optimum after the transformation.
  • No new optimization over pairs of distributions is needed when the constraint is imposed.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The principle could extend to other structural constraints not examined in the paper.
  • Similar post-processing ideas might simplify constrained versions of related quantities in robust statistics.
  • Numerical checks on concrete examples could identify the explicit transformations for each constraint type.
  • The result suggests that anytime-valid procedures can incorporate privacy or boundedness requirements more readily.

Load-bearing premise

That an appropriate transformation exists for each listed constraint which preserves log-optimality without requiring a different pair of least favorable distributions.

What would settle it

Finding one of the listed constraints, such as differential privacy, for which the transformed unconstrained optimum is not the true log-optimal constrained e-variable would disprove the central claim.

read the original abstract

E-variables enable safe and anytime-valid inference, with log-optimal e-variables given by the likelihood ratio of the least favorable distributions (LFDs) when they exist in composite settings. While this unconstrained theory is well understood, one may need/wish to impose additional structural constraints, including differential privacy, quantization, boundedness, or moment restrictions. We show that under these constraints, log-optimal constrained e-variables can often be constructed by a simple \emph{optimize-then-constrain} principle: first compute the unconstrained log-optimal e-variable, then impose the constraint via an appropriate transformation. Thus, the constrained growth-rate optimization problem does not require solving for a different LFD pair; the constrained optimal solution is just a post-processing of the unconstrained optimal solution.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The paper claims that log-optimal constrained e-variables under structural constraints (differential privacy, quantization, boundedness, moment restrictions) can be obtained via an 'optimize-then-constrain' principle: compute the unconstrained log-optimal e-variable as the likelihood ratio of the least favorable distributions (LFDs), then apply a suitable post-processing transformation T to enforce the constraint while preserving the e-variable property and the maximal growth rate E_Q[log T(E)]. The constrained optimization thus does not require solving for a new LFD pair.

Significance. If the central claim holds with explicit constructions and proofs for the listed constraints, the result would simplify construction of constrained e-variables by reusing unconstrained LFD theory and transformations, enabling practical anytime-valid inference in privacy-preserving, quantized, or bounded settings without re-deriving saddle points. It builds directly on established LFD concepts from prior literature rather than introducing new free parameters or self-referential definitions.

major comments (2)
  1. [Abstract] Abstract and introduction: The 'optimize-then-constrain' principle is asserted to work for differential privacy, quantization, boundedness, and moment restrictions, but the manuscript must explicitly verify (via derivation or counterexample check) that for each constraint the transformation T simultaneously satisfies E_P[T(E)] ≤ 1, meets the constraint, and achieves the maximal growth rate without the supporting LFD pair changing. The skeptic concern is that some constraints may alter the feasible set enough to shift the saddle point of the growth-rate game, requiring a different LFD pair; this needs to be addressed with a concrete check for at least the DP and moment-restriction cases.
  2. [Introduction / main claim] The central derivation relies on the axiom that 'the constrained optimization problem admits a solution that is a transformation of the unconstrained solution.' This needs to be proven or shown to hold under the paper's assumptions rather than taken as given, especially since the full details of the transformations and their preservation of log-optimality are not verifiable from the abstract alone.
minor comments (1)
  1. Clarify notation for the transformation T and the constrained growth-rate objective in the main text to avoid ambiguity with the unconstrained case.

Simulated Author's Rebuttal

2 responses · 0 unresolved

Thank you for the referee's constructive feedback. We respond to the major comments point by point below. We agree that strengthening the explicit verifications will benefit the manuscript.

read point-by-point responses
  1. Referee: [Abstract] Abstract and introduction: The 'optimize-then-constrain' principle is asserted to work for differential privacy, quantization, boundedness, and moment restrictions, but the manuscript must explicitly verify (via derivation or counterexample check) that for each constraint the transformation T simultaneously satisfies E_P[T(E)] ≤ 1, meets the constraint, and achieves the maximal growth rate without the supporting LFD pair changing. The skeptic concern is that some constraints may alter the feasible set enough to shift the saddle point of the growth-rate game, requiring a different LFD pair; this needs to be addressed with a concrete check for at least the DP and moment-restriction cases.

    Authors: We appreciate the referee pointing out the need for more explicit verification to address potential concerns about shifts in the LFDs. The manuscript derives the post-processing transformations for each listed constraint and shows that they preserve both the e-variable property and the maximal growth rate using the original LFD pair. This is because the transformations are designed to be applied after computing the likelihood ratio, and the expectation under the null remains bounded by 1 while the growth rate is not reduced. To directly address the skeptic concern, we will add a new subsection with concrete derivations and checks for the differential privacy and moment restriction cases, demonstrating that the saddle point does not change. revision: yes

  2. Referee: [Introduction / main claim] The central derivation relies on the axiom that 'the constrained optimization problem admits a solution that is a transformation of the unconstrained solution.' This needs to be proven or shown to hold under the paper's assumptions rather than taken as given, especially since the full details of the transformations and their preservation of log-optimality are not verifiable from the abstract alone.

    Authors: We clarify that the manuscript does not treat this as an unproven axiom but establishes it through a general argument applicable to the considered constraint classes. The key is that for these structural constraints, there exists a transformation T that maps the unconstrained optimal e-variable to a constrained one without loss of optimality. The full proof and details of T are provided in the body of the paper. Since the abstract is necessarily concise, we will revise the introduction to include a brief proof outline and better signpost the relevant sections where the preservation of log-optimality is shown. revision: yes

Circularity Check

0 steps flagged

No significant circularity; derivation builds on independent LFD theory

full rationale

The paper's central result is a construction principle showing that constrained log-optimal e-variables are obtained via post-processing transformations applied to the unconstrained log-optimal e-variable (likelihood ratio of LFD pair). This is framed as a theorem to be proven for listed constraints, not a definitional equivalence or fitted parameter renamed as prediction. The unconstrained LFD theory is described as 'well understood' from prior literature without load-bearing self-citations that reduce the claim to unverified author work. No self-definitional steps, ansatz smuggling, or renaming of known results appear in the provided derivation outline. The argument remains externally falsifiable via the growth-rate optimization and e-variable properties.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

The claim rests on the prior existence of log-optimal e-variables via LFDs and on the mathematical existence of suitable post-processing transformations for the listed constraint classes.

axioms (2)
  • domain assumption Existence of least favorable distributions (LFDs) that achieve the unconstrained log-optimal e-variable
    The paper explicitly builds on the known result that unconstrained log-optimal e-variables are given by LFD likelihood ratios.
  • ad hoc to paper The constrained optimization problem admits a solution that is a transformation of the unconstrained solution
    This is the central new assumption required for the optimize-then-constrain principle to hold.

pith-pipeline@v0.9.0 · 5414 in / 1198 out tokens · 31573 ms · 2026-05-09T21:00:57.456842+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

72 extracted references · 72 canonical work pages · 1 internal anchor

  1. [1]

    International conference on machine learning , pages=

    The composition theorem for differential privacy , author=. International conference on machine learning , pages=. 2015 , organization=

  2. [2]

    Journal of Machine Learning Research , volume=

    Extremal mechanisms for local differential privacy , author=. Journal of Machine Learning Research , volume=

  3. [3]

    and Jordan, Michael I

    Duchi, John C. and Jordan, Michael I. and Wainwright, Martin J. , booktitle=. Local Privacy and Statistical Minimax Rates , year=

  4. [4]

    Foundations and trends

    The algorithmic foundations of differential privacy , author=. Foundations and trends. 2014 , publisher=

  5. [5]

    IEEE Transactions on Information Theory , year=

    Huber-robust likelihood ratio tests for composite nulls and alternatives , author=. IEEE Transactions on Information Theory , year=

  6. [6]

    International Conference on Artificial Intelligence and Statistics , pages=

    Huber-robust confidence sequences , author=. International Conference on Artificial Intelligence and Statistics , pages=. 2023 , organization=

  7. [7]

    Annales de l'IHP Probabilit

    Challenging the empirical mean and empirical variance: a deviation study , author=. Annales de l'IHP Probabilit

  8. [8]

    Annals of Statistics , year=

    Time-uniform, nonparametric, nonasymptotic confidence sequences , author=. Annals of Statistics , year=

  9. [9]

    Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability , year=

    Optimal gambling systems for favorable games , author=. Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability , year=

  10. [10]

    The Bell System Technical Journal , volume=

    A new interpretation of information rate , author=. The Bell System Technical Journal , volume=

  11. [11]

    2019 , publisher=

    Game-theoretic foundations for probability and finance , author=. 2019 , publisher=

  12. [12]

    The Annals of Mathematical Statistics , volume=

    Statistical methods related to the law of the iterated logarithm , author=. The Annals of Mathematical Statistics , volume=. 1970 , publisher=

  13. [13]

    The Annals of Mathematical Statistics , pages=

    A robust version of the probability ratio test , author=. The Annals of Mathematical Statistics , pages=. 1965 , publisher=

  14. [14]

    Zeitschrift f

    Robust confidence limits , author=. Zeitschrift f. 1968 , publisher=

  15. [15]

    2011 , publisher=

    Robust statistics , author=. 2011 , publisher=

  16. [16]

    The Annals of Mathematical Statistics , volume=

    Sequential Tests of Statistical Hypotheses , author=. The Annals of Mathematical Statistics , volume=. 1945 , publisher=

  17. [17]

    Journal of the Royal Statistical Society Series B: Statistical Methodology , year=

    Safe testing , author=. Journal of the Royal Statistical Society Series B: Statistical Methodology , year=

  18. [18]

    Statistical Science , year=

    Game-theoretic statistics and safe anytime-valid inference , author=. Statistical Science , year=

  19. [19]

    The Annals of Statistics , pages=

    Robust sequential testing , author=. The Annals of Statistics , pages=. 1985 , publisher=

  20. [20]

    Contributions to probability and statistics , pages=

    A survey of sampling from contaminated distributions , author=. Contributions to probability and statistics , pages=. 1960 , publisher=

  21. [21]

    The Annals of Mathematical Statistics , pages=

    Robust Estimation of a Location Parameter , author=. The Annals of Mathematical Statistics , pages=. 1964 , publisher=

  22. [22]

    1986 , publisher=

    Testing statistical hypotheses , author=. 1986 , publisher=

  23. [23]

    Technometrics , volume=

    Rejection of outliers , author=. Technometrics , volume=. 1960 , publisher=

  24. [24]

    The Annals of Mathematical Statistics , pages=

    On some robust estimates of location , author=. The Annals of Mathematical Statistics , pages=. 1965 , publisher=

  25. [25]

    International Conference on Machine Learning , pages=

    Minimax m-estimation under adversarial contamination , author=. International Conference on Machine Learning , pages=. 2022 , organization=

  26. [26]

    Journal of the american statistical association , volume=

    The influence curve and its role in robust estimation , author=. Journal of the american statistical association , volume=. 1974 , publisher=

  27. [27]

    Stochastic Processes and Their Applications , volume=

    Catoni-style confidence sequences for heavy-tailed mean estimation , author=. Stochastic Processes and Their Applications , volume=. 2023 , publisher=

  28. [28]

    PhD thesis , year=

    The complexity of massive data set computations , author=. PhD thesis , year=

  29. [29]

    International Conference on Artificial Intelligence and Statistics , pages=

    Robust hypothesis testing and distribution estimation in hellinger distance , author=. International Conference on Artificial Intelligence and Statistics , pages=. 2021 , organization=

  30. [30]

    Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing , pages=

    The structure of optimal private tests for simple hypotheses , author=. Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing , pages=

  31. [31]

    The Annals of Mathematical Statistics , volume=

    Asymptotic properties of non-linear least squares estimators , author=. The Annals of Mathematical Statistics , volume=. 1969 , publisher=

  32. [32]

    , author Ruf, J

    Admissible anytime-valid sequential inference must rely on nonnegative martingales , author=. arXiv preprint arXiv:2009.03167 , year=

  33. [33]

    International Journal of Approximate Reasoning , volume=

    Testing exchangeability: Fork-convexity, supermartingales and e-processes , author=. International Journal of Approximate Reasoning , volume=. 2022 , publisher=

  34. [34]

    Journal of the Royal Statistical Society Series A: Statistics in Society , volume=

    Testing by betting: A strategy for statistical and scientific communication , author=. Journal of the Royal Statistical Society Series A: Statistics in Society , volume=. 2021 , publisher=

  35. [35]

    Time-uniform

    Howard, Steven R and Ramdas, Aaditya and McAuliffe, Jon and Sekhon, Jasjeet , journal=. Time-uniform

  36. [36]

    Etude critique de la notion de collectif , author=. Bull. Amer. Math. Soc , volume=

  37. [37]

    Always valid inference: Continuous monitoring of

    Johari, Ramesh and Koomen, Pete and Pekelis, Leonid and Walsh, David , journal=. Always valid inference: Continuous monitoring of. 2022 , publisher=

  38. [38]

    Proceedings of the National Academy of Sciences , volume=

    Some nonparametric sequential tests with power one , author=. Proceedings of the National Academy of Sciences , volume=. 1968 , publisher=

  39. [39]

    The Annals of Statistics , number =

    Martin Larsson and Aaditya Ramdas and Johannes Ruf , title =. The Annals of Statistics , number =. 2025 , doi =

  40. [40]

    Proceedings of the National Academy of Sciences , volume=

    Universal inference , author=. Proceedings of the National Academy of Sciences , volume=. 2020 , publisher=

  41. [41]

    Journal of the Royal Statistical Society Series B (Methodology), with discussion , year=

    Estimating means of bounded random variables by betting , author=. Journal of the Royal Statistical Society Series B (Methodology), with discussion , year=

  42. [42]

    International Conference on Artificial Intelligence and Statistics , pages=

    Testing exchangeability by pairwise betting , author=. International Conference on Artificial Intelligence and Statistics , pages=. 2024 , organization=

  43. [43]

    , author=

    Sequential analysis. , author=. 1947 , journal=

  44. [44]

    Advances in Neural Information Processing Systems , volume=

    Confidence sequences for sampling without replacement , author=. Advances in Neural Information Processing Systems , volume=

  45. [45]

    , author=

    Estimation of Mixture Models. , author=. 1999 , journal=

  46. [46]

    Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability , volume=

    The behavior of maximum likelihood estimates under nonstandard conditions , author=. Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability , volume=. 1967 , organization=

  47. [47]

    2004 , publisher=

    Robust Statistics , author=. 2004 , publisher=

  48. [48]

    Gambling Research: Gambling and Risk Taking,

    Log optimal portfolios , author=. Chapter in “Gambling Research: Gambling and Risk Taking,” Seventh International Conference , volume=

  49. [49]

    IEEE Transactions of Information Theory , year=

    Reverse information projections and optimal e-statistics , author=. IEEE Transactions of Information Theory , year=

  50. [50]

    2024 , volume =

    Agrawal, Shubhada and Mathieu, Timoth\'ee and Basu, Debabrota and Maillard, Odalric-Ambrym , booktitle =. 2024 , volume =

  51. [51]

    Robust hypothesis testing using

    Gao, Rui and Xie, Liyan and Xie, Yao and Xu, Huan , journal=. Robust hypothesis testing using

  52. [52]

    IEEE Transactions on Information Theory , volume=

    Kernel robust hypothesis testing , author=. IEEE Transactions on Information Theory , volume=. 2023 , publisher=

  53. [53]

    A data-driven approach to robust hypothesis testing using

    Wang, Jie and Xie, Yao , booktitle=. A data-driven approach to robust hypothesis testing using. 2022 , organization=

  54. [54]

    ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) , pages=

    Robust hypothesis testing with moment constrained uncertainty sets , author=. ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) , pages=. 2023 , organization=

  55. [55]

    Post-detection inference for sequential changepoint localization

    Post-detection inference for sequential changepoint localization , author=. arXiv preprint arXiv:2502.06096 , year=

  56. [56]

    The New England Journal of Statistics in Data Science , volume =

    Jaehyeok Shin and Aaditya Ramdas and Alessandro Rinaldo , title =. The New England Journal of Statistics in Data Science , volume =. 2023 , pages =

  57. [57]

    Foundations and Trends in Statistics , volume =

    Hypothesis testing with e-values , author=. Foundations and Trends in Statistics , volume =

  58. [58]

    IEEE Transactions on Information Theory , volume=

    Robust decision design using a distance criterion , author=. IEEE Transactions on Information Theory , volume=. 1980 , publisher=

  59. [59]

    Minimax tests and the

    Huber, Peter J and Strassen, Volker , journal=. Minimax tests and the. 1973 , publisher=

  60. [60]

    IEEE Transactions on Information Theory , volume=

    Decentralized sequential detection with a fusion center performing the sequential test , author=. IEEE Transactions on Information Theory , volume=. 1993 , publisher=

  61. [61]

    1989 , journal=

    Decentralized detection , author=. 1989 , journal=

  62. [62]

    SIAM Journal on Computing , volume=

    What can we learn privately? , author=. SIAM Journal on Computing , volume=. 2011 , publisher=

  63. [63]

    arXiv preprint arXiv:2510.18654 , year=

    Differentially Private E-Values , author=. arXiv preprint arXiv:2510.18654 , year=

  64. [64]

    IEEE Transactions on Information Theory , volume=

    Simple binary hypothesis testing under local differential privacy and communication constraints , author=. IEEE Transactions on Information Theory , volume=. 2024 , publisher=

  65. [65]

    Bernoulli , volume=

    Minimax optimal goodness-of-fit testing for densities and multinomials under a local differential privacy constraint , author=. Bernoulli , volume=. 2022 , publisher=

  66. [66]

    arXiv preprint arXiv:2411.09064 , year=

    Minimax Optimal Two-Sample Testing under Local Differential Privacy , author=. arXiv preprint arXiv:2411.09064 , year=

  67. [67]

    Theory of cryptography conference , pages=

    Calibrating noise to sensitivity in private data analysis , author=. Theory of cryptography conference , pages=. 2006 , organization=

  68. [68]

    International conference on machine learning , pages=

    Differentially private chi-squared hypothesis testing: Goodness of fit and independence testing , author=. International conference on machine learning , pages=. 2016 , organization=

  69. [69]

    Proceedings of the 31st Conference On Learning Theory , pages =

    Geometric Lower Bounds for Distributed Parameter Estimation under Communication Constraints , author =. Proceedings of the 31st Conference On Learning Theory , pages =. 2018 , editor =

  70. [70]

    Advances in Neural Information Processing Systems , volume=

    Pointwise bounds for distribution estimation under communication constraints , author=. Advances in Neural Information Processing Systems , volume=

  71. [71]

    IEEE Transactions on Information Theory , volume=

    Communication-constrained hypothesis testing: Optimality, robustness, and reverse data processing inequalities , author=. IEEE Transactions on Information Theory , volume=. 2023 , publisher=

  72. [72]

    arXiv preprint arXiv:2409.05654 , year=

    Continuous testing: Unifying tests and e-values , author=. arXiv preprint arXiv:2409.05654 , year=