International audienceIn information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by repeating the observations. More precisely, it can approximate the distribution on the observables by computing their frequencies, and then derive the distribution on the secrets by using the correlation in the inverse direction. We illustrate this method, and then we study the bounds on the approximation error associated with it, ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can often be regarded as noisy channels in the i...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceWe address the problem of computing the information leakage of a system in an ...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceWe address the problem of computing the information leakage of a system in an ...
We consider problems where n people are communicating and a random subset of them is trying to leak ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can often be regarded as noisy channels in the i...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceWe address the problem of computing the information leakage of a system in an ...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceWe address the problem of computing the information leakage of a system in an ...
We consider problems where n people are communicating and a random subset of them is trying to leak ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can often be regarded as noisy channels in the i...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...