Content replaced at author's request on 2014-02-12.Only recently have approaches to quantitative information flow started to challenge the presumption that all leaks involving a given number of bits are equally harmful. This paper proposes a framework to capture the semantics of information, making quantification of leakage independent of the syntactic representation of secrets. Secrets are defined in terms of fields, which are combined to form structures; and a worth assignment is introduced to associate each structure with a worth (perhaps in proportion to the harm that would result from disclosure). We show how worth assignments can capture inter dependence among structures within a secret, modeling: (i) secret sharing, (ii) information-...
International audienceOrder-Revealing Encryption (ORE) allows deriving the order of two plaintexts t...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Belief and vulnerability have been proposed re- cently to quantify information flow in security syst...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
Several mathematical ideas have been investigated for Quantitative Information Flow. Information the...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
We provide a novel definition of quantitative information flow, called transmissible information, th...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
International audienceOrder-Revealing Encryption (ORE) allows deriving the order of two plaintexts t...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Belief and vulnerability have been proposed re- cently to quantify information flow in security syst...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
Several mathematical ideas have been investigated for Quantitative Information Flow. Information the...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
We provide a novel definition of quantitative information flow, called transmissible information, th...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
International audienceOrder-Revealing Encryption (ORE) allows deriving the order of two plaintexts t...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...