Quantitative information flow in interactive systems

被引:14
作者
Alvim, Mario S. [1 ,2 ]
Andres, Miguel E. [3 ]
Palamidessi, Catuscia [1 ,2 ]
机构
[1] Ecole Polytech Palaiseau, INRIA, Palaiseau, France
[2] Ecole Polytech Palaiseau, LIX, Rue Saclay, F-91128 Palaiseau, France
[3] Radboud Univ Nijmegen, Inst Comp & Informat Sci, Nijmegen, Netherlands
关键词
Probabilistic systems; information flow and anonymity; information-theoretic channel; Kantorovich metric;
D O I
10.3233/JCS-2011-0433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the information-theoretic approach which interprets such systems as (simple) noisy channels is no longer valid. However, the principle can be recovered if we consider channels of a more complicated kind, that in Information Theory are known as channels with memory and feedback. We show that there is a complete correspondence between interactive systems and such channels. Furthermore, we show that the capacity of the channels associated to such systems is a continuous function with respect to a pseudometric based on the Kantorovich metric.
引用
收藏
页码:3 / 50
页数:48
相关论文
共 28 条
[11]  
Goktas E., 2014, MITLCSTR676, P575
[12]  
Gray J. W. III, 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P21, DOI 10.1109/RISP.1991.130769
[13]  
Kantorovich L., 1942, MANAGE SCI, V5, P1
[14]  
Kopf B, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P286
[15]  
Malacaria P, 2007, CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES, P225
[16]  
Massey JL., 1990, P IEEE INT S INF THE
[17]  
McLean J., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P180, DOI 10.1109/RISP.1990.63849
[18]  
Millen J. K., 1990, Proceedings. The Computer Security Foundations Workshop III (Cat. No.TH0315-2), P84, DOI 10.1109/CSFW.1990.128188
[19]  
Poundstone W., 1992, PRISONERS DILEMMA
[20]  
Skyrms B., 2003, STAG HUNT EVOLUTION