2011
DOI: 10.1007/978-3-642-19805-2_27
|View full text |Cite
|
Sign up to set email alerts
|

Asymptotic Information Leakage under One-Try Attacks

Abstract: We study the asymptotic behaviour of (a) information leakage and (b) adversary's error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n sho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…This result extends to the general case |X | ≥ 2. Provided R is non-singular, it is enough to replace C (p 1 , p 2 ) by min x =x C (p x , p x ), thus (see [6,26]):…”
Section: Asymptotic Behaviormentioning
confidence: 99%
See 3 more Smart Citations
“…This result extends to the general case |X | ≥ 2. Provided R is non-singular, it is enough to replace C (p 1 , p 2 ) by min x =x C (p x , p x ), thus (see [6,26]):…”
Section: Asymptotic Behaviormentioning
confidence: 99%
“…Randomization mechanisms are information-theoretic channels. The use of this concept in the field of qif has been in recent years promoted by, among others, Chatzikokolakis, Palamidessi and their collaborators [10,11,9]; the systems amenable to this form of representation are sometimes referred to as information hiding systems; 1 see also [6,7].…”
Section: Basic Terminologymentioning
confidence: 99%
See 2 more Smart Citations
“…These principles have been used to create ever more sophisticated QIF frameworks to model systems and reason about leakage. (See, for example, [1,2,3,4,5,6,7,8,9,10,11,12,13].) Traditional approaches to QIF represent the adversary's prior knowledge as a probability distribution on secret values.…”
Section: Introductionmentioning
confidence: 99%