Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure Information Flow, tend to converge towards the idea of modeling the system as a noisy channel in the information-theoretic sense. The notion of information leakage, or vulnerability of the system, has been related in some approaches to the concept of mutual information of the channel. A recent work of Smith has shown, however, that if the attack consists in one single try, then the mutual information and other concepts based on Shannon entropy are not suitable, and he has proposed to use Rényi's min-entropy instead. In this paper, we consider and compare two different possibilities of defining the leakage, based on the Bayes risk, a concept ...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Abstract—While information-theoretic security is stronger than computational security, it has long b...