AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity and Secure Information Flow, tend to converge towards the idea of modeling the system as a noisy channel in the information-theoretic sense. The notion of information leakage, or vulnerability of the system, has been related in some approaches to the concept of mutual information of the channel. A recent work of Smith has shown, however, that if the attack consists in one single try, then the mutual information and other concepts based on Shannon entropy are not suitable, and he has proposed to use Rényi's min-entropy instead. In this paper, we consider and compare two different possibilities of defining the leakage, based on the Bayes risk, a ...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
We put forward a general model intended for assessment of system security against passive eavesdropp...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
We put forward a general model intended for assessment of system security against passive eavesdropp...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...