2019 IEEE 32nd Computer Security Foundations Symposium (CSF) 2019
DOI: 10.1109/csf.2019.00036
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic Channel Design for Minimum Leakage

Abstract: This work explores the problem of designing a channel that leaks the least amount of information while respecting a set of operational constraints. This paper focuses on deterministic channels and deterministic solutions. This setting is relevant because most programs and many channel design problems are naturally modelled by deterministic channels. Moreover, the setting is also relevant when considering an attacker who can observe many outputs of an arbitrary channel while the secret input stays the same: whe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 31 publications
(51 reference statements)
1
11
0
Order By: Relevance
“…The next result from [2] confirms that some of the most usual entropy measures are channel-supermodular.…”
Section: Channel-supermodular Entropiessupporting
confidence: 61%
See 2 more Smart Citations
“…The next result from [2] confirms that some of the most usual entropy measures are channel-supermodular.…”
Section: Channel-supermodular Entropiessupporting
confidence: 61%
“…Another preorder introduced by Shannon [17] includes the one above. A channel K 1 is said to include K 2 , indicated 1 All logarithms are taken to the base 2 2 For 0 < α < 1, one may take instead: η(x) = α 1−α log(x), F (X) = p α for the fist case and η(x) = 1 1−α log(x), F (X) = p α α for the second.…”
Section: Preorders Over Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, when designing systems, it is often the case that some leakage is unavoidable. With that in mind, some recent works in QIF aimed at obtaining channels that leak the least amount of information subject to some operational constraints [ 13 , 28 , 29 ]. From Definition 3, the problem can be rephrased as finding the channel which, subject to some operational constraints, maximizes — or, as is increasing, maximizes .…”
Section: Channel Designmentioning
confidence: 99%
“…In this work, we present a robust anonymity mechanism. The algorithm is based on a result from [ 13 ], which uses the properties of channel-supermodularity presented in this paper to derive a greedy channel design algorithm that is provably optimal and unique for all channel-supermodular measures of leakage. We apply our robust anonymity mechanism to query anonymization: we consider the problem in which the real query itself is the secret, and we also consider the scenario where a related attribute is the secret.…”
Section: Introductionmentioning
confidence: 99%