首页> 外文会议>International Symposium on Trustworthy Global Computing >Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols
【24h】

Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols

机译:在信息隐藏协议中输入的输入分布泄漏的界限

获取原文

摘要

In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by repeating the observations. More precisely, it can approximate the distribution on the observables by computing their frequencies, and then derive the distribution on the secrets by using the correlation in the inverse direction. We illustrate this method, and then we study the bounds on the approximation error associated with it, for various natural notions of error. As a case study, we apply our results to Crowds, a protocol for anonymous communication.
机译:在信息隐藏中,如果它知道秘密的分布,那么试图推断秘密信息的对手具有更高的成功概率。我们表明,如果系统泄漏了概率上有关秘密的一些信息,则(即,如果秘密与某些观察者之间存在概率相关),则对手可以通过重复观察来近似这些分布。更确切地说,它可以通过计算其频率来近似观察到的分布,然后通过使用逆方向上的相关性来导出秘密上的分布。我们说明了这种方法,然后我们研究了与它相关的近似误差的界限,用于误差的各种自然概念。作为一个案例研究,我们将我们的结果应用于人群,是匿名通信的协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号