International audienceRandomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the MAP (Maximum Aposteriori Probability) inference rule. Our main result is a constructive characterization of a convex base of the probability of error, which allows us to compute its maximum value (over all possible input distributions), and to identify upper bounds for it in terms of simple functions. As a side result, we are able to improve the Hellman-Raviv and the Santhi-Vardy bounds expressed i...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can be regarded as noisy channels in the informa...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in ...