Information Theoretical Cryptogenography

被引:1
作者
Jakobsen, Sune K. [1 ]
机构
[1] UCL, Dept Comp Sci, London, England
关键词
Anonymity; Code-based cryptography; Cryptography; Information theory; Steganography;
D O I
10.1007/s00145-016-9242-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider problems where n people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most c to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is (-log(1-c)/c - log(e)) bits.
引用
收藏
页码:1067 / 1115
页数:49
相关论文
共 25 条
[1]  
[Anonymous], 1997, Communication complexity
[2]   Interactive epistemology II: Probability [J].
Aumann, RJ .
INTERNATIONAL JOURNAL OF GAME THEORY, 1999, 28 (03) :301-314
[3]   ANOA: A Framework For Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties [J].
Backes, Michael ;
Kate, Aniket ;
Manoharan, Praveen ;
Meiser, Sebastian ;
Mohammadi, Esfandiar .
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, :163-178
[4]  
Bagai R., 2011, P 11 PRIV ENH TECHN
[5]  
Brody J., 2014, ITCS
[6]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[7]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[8]  
Clauss S, 2006, P 2 ACM WORKSH DIG I, P55, DOI DOI 10.1145/1179529.1179539
[9]  
Cover TM., 1991, ELEMENTS INFORM THEO, V1, P279
[10]  
Danezis G., 2008, Tech. rep. Technical Report MSR-TR-2008-35