2012
DOI: 10.1007/978-3-642-33475-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Worst- and Average-Case Privacy Breaches in Randomization Mechanisms

Abstract: Abstract. In a variety of contexts, randomization is regarded as an effective technique to conceal sensitive information. We model randomization mechanisms as information-theoretic channels. Our starting point is a semantic notion of security that expresses absence of any privacy breach above a given level of seriousness , irrespective of any background information, represented as a prior probability on the secret inputs. We first examine this notion according to two dimensions: worst vs. average case, single … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…[12,11,3,30,4,5,21] and references therein. In the last few years, various extensions of the basic model have been considered: to mention but a few, [6] considers the case of one-try (min-entropy) attacks under repeated observations, while the worst-vs. average-case dimension is examined in [9]. Especially relevant to the present paper is the issue of partial secret disclosure [7] and, more generally, of leakage characterization in terms of adversary's (generic) gain, or g-leakage [1].…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…[12,11,3,30,4,5,21] and references therein. In the last few years, various extensions of the basic model have been considered: to mention but a few, [6] considers the case of one-try (min-entropy) attacks under repeated observations, while the worst-vs. average-case dimension is examined in [9]. Especially relevant to the present paper is the issue of partial secret disclosure [7] and, more generally, of leakage characterization in terms of adversary's (generic) gain, or g-leakage [1].…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Work that considers the privacy of multiple pieces of sensitive information against attackers with a wide variety of prior beliefs or background knowledge (e.g., [23,41,42,8,37,54,7,26,5,29,51]) is of particular relevance to this paper. The methodology we present here is complementary to such work and seeks to answer the inverse question, that of identifying the specific attackers and the specific pieces of information that are hidden from them by a privacy definition.…”
Section: Evaluating Privacymentioning
confidence: 99%
“…but, if one accepts the Axiom of Choice, linear constraints are much more complicated and are generally defined via finitely additive measures [59]. 8 On the other hand, in constructive mathematics, 9 more complicated linear constraints cannot be proven to exist ([59], Sections 14.77, 23.10, and 27.45; and [44]). Therefore we only consider the types of linear constraints shown in Equation 1.…”
Section: Infinite Dimensional Row Conesmentioning
confidence: 99%
See 2 more Smart Citations