Quantitative Notions of Leakage for One-try Attacks

被引:83
作者
Braun, Christelle [1 ,2 ]
Chatzikokolakis, Konstantinos [3 ]
Palamidessi, Catuscia [1 ,2 ]
机构
[1] INRIA, Palaiseau, France
[2] Ecole Polytech, LIX, Palaiseau, France
[3] Tech Univ Eindhoven, Eindhoven, Netherlands
关键词
Information-hiding; hypothesis testing; probability of error; Renyi min-entropy;
D O I
10.1016/j.entcs.2009.07.085
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure Information Flow, tend to converge towards the idea of modeling the system as a noisy channel in the information-theoretic sense. The notion of information leakage, or vulnerability of the system, has been related in some approaches to the concept of mutual information of the channel. A recent work of Smith has shown, however, that if the attack consists in one single try, then the mutual information and other concepts based on Shannon entropy are not suitable, and he has proposed to use Renyi's min-entropy instead. In this paper, we consider and compare two different possibilities of defining the leakage, based on the Bayes risk, a concept related to Renyi min-entropy.
引用
收藏
页码:75 / 91
页数:17
相关论文
共 12 条
  • [1] Cachin Christian, 1997, THESIS
  • [2] Anonymity protocols as noisy channels
    Chatzikokolaks, Konstantincis
    Palamidessi, Catuscia
    Panangaden, Prakash
    [J]. INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 378 - 401
  • [3] Quantitative information flow, relations and polymorphic types
    Clark, D
    Hunt, S
    Malacaria, P
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2005, 15 (02) : 181 - 199
  • [4] Cover T. M., 2006, ELEMENTS INFORM THEO, DOI [DOI 10.1002/047174882X, DOI 10.1002/047174882X.CH5]
  • [5] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [6] Malacaria P, 2007, CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES, P225
  • [7] Lagrange Multipliers and Maximum Information Leakage in Different Observational Models
    Malacaria, Pasquale
    Chen, Han
    [J]. PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY, 2008, : 135 - 146
  • [8] Moskowitz I.S., 2003, IASTED CNIS, P126
  • [9] MOSKOWITZ IS, 2003, WPES, P79, DOI DOI 10.1145/1005140.1005153
  • [10] Renyi A., 1961, P 4 BERKELEY S MATH, V1, P547