Probability of error in information-hiding protocols

被引:19
作者
Chatzikokolakis, Konstantinos [1 ]
Palamidessi, Catuscia [1 ]
Panangaden, Prakash [2 ]
机构
[1] Ecole Polytech, INRIA, Palaiseau, France
[2] McGill Univ, Montreal, PQ, Canada
来源
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS | 2007年
关键词
D O I
10.1109/CSF.2007.27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the inference when the MAP (Maximum Aposteriori Probability) decision rule is adopted. Our main result is a constructive characterization of a convex base of the probability of error, which allows us to compute its maximum value (over all possible input distributions), and to identify upper bounds for it in terms of simple functions. As a side result, we are able to improve substantially the Hellman-Raviv and the Santhi-Vardy bounds expressed in terms of conditional entropy. We then discuss an application of our methodology to the Crowds protocol, and in particular we show how to compute the bounds on the probability, that an adversary breaks anonymity.
引用
收藏
页码:341 / +
页数:3
相关论文
共 26 条
  • [1] Bhargava M, 2005, LECT NOTES COMPUT SC, V3653, P171, DOI 10.1007/11539452_16
  • [2] CHATZIKOKOLAKIS K, 2006, IN PRESS LECT NOTES
  • [3] Probable innocence revisited
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 123 - 138
  • [4] Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
  • [5] CLARK D, 2001, ELECT NOTES THEOR CO, V59, P238
  • [6] Quantified Interference for a While Language
    Clark, David
    Hunt, Sebastian
    Malacaria, Pasquale
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 149 - 166
  • [7] CLARKE I, 2000, LECT NOTES COMPUTER, V2009, P44
  • [8] Cover TM, 2006, Elements of Information Theory
  • [9] DENG Y, 2006, IN PRESS LECT NOTES
  • [10] Di Pierro A., 2004, Journal of Computer Security, V12, P37