We consider problems where n people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most c to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is (−log(1−c)c−log(e)) bits
International audienceAnonymity means that the identity of the user performing a certain action is m...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
We consider the following cryptographic secret leaking problem. A group of players communicate with ...
We consider the following cryptographic secret leaking problem. A group of players communicate with ...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
PhDThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amo...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
We put forward a general model intended for assessment of system security against passive eavesdropp...
The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceAnonymity means that the identity of the user performing a certain action is m...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
We consider the following cryptographic secret leaking problem. A group of players communicate with ...
We consider the following cryptographic secret leaking problem. A group of players communicate with ...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
PhDThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amo...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
We put forward a general model intended for assessment of system security against passive eavesdropp...
The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceAnonymity means that the identity of the user performing a certain action is m...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...