2014
DOI: 10.1017/s0960129513000613
|View full text |Cite
|
Sign up to set email alerts
|

Asymptotic information leakage under one-try attacks

Abstract: We study the asymptotic behaviour of (a) information leakage and (b) adversary's error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n sho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 32 publications
0
12
0
Order By: Relevance
“…The attacker is in a position to ask a source, perhaps the hospital db, queries concerning non sensitive information (ZIP code, age and discharge date) of any individual, including JD, and compare the answers with the table's entries. 5 This situation can be modeled quite simply as an action-based mechanism S, as follows. We pose: Act = {ZIP, Age, Date}; X = {1, .…”
Section: Examplesmentioning
confidence: 99%
See 2 more Smart Citations
“…The attacker is in a position to ask a source, perhaps the hospital db, queries concerning non sensitive information (ZIP code, age and discharge date) of any individual, including JD, and compare the answers with the table's entries. 5 This situation can be modeled quite simply as an action-based mechanism S, as follows. We pose: Act = {ZIP, Age, Date}; X = {1, .…”
Section: Examplesmentioning
confidence: 99%
“…Like in the static case, this dynamic g-leakage does not lend itself to be recast in the present framework. A dynamic approach is also at the core of a model in [5] based on Hidden Markov Models, where the observed system evolves over time, although the secret is fixed.…”
Section: Boreale and F Pampalonimentioning
confidence: 99%
See 1 more Smart Citation
“…[12,11,3,30,4,5,21] and references therein. In the last few years, various extensions of the basic model have been considered: to mention but a few, [6] considers the case of one-try (min-entropy) attacks under repeated observations, while the worst-vs. average-case dimension is examined in [9]. Especially relevant to the present paper is the issue of partial secret disclosure [7] and, more generally, of leakage characterization in terms of adversary's (generic) gain, or g-leakage [1].…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Boreale et al [BPP11] proved that ML(C (n) ) converges exponentially quickly to the logarithm of the number of distinct rows in C. (Intuitively, distinct rows of the channel matrix can be distinguished by repeatedly sampling the output.) More precisely, their Theorem 1 restricted to the case of a uniform prior (which realizes min-capacity) can be restated in the following form:…”
Section: Leakage Of a Repeated Independent Runs Channelmentioning
confidence: 99%