首页> 外文会议>Trustworthy global computing >Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols
【24h】

Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols

机译:信息隐藏协议中输入分布泄漏的界限

获取原文
获取原文并翻译 | 示例

摘要

In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by repeating the observations. More precisely, it can approximate the distribution on the observables by computing their frequencies, and then derive the distribution on the secrets by using the correlation in the inverse direction. We illustrate this method, and then we study the bounds on the approximation error associated with it, for various natural notions of error. As a case study, we apply our results to Crowds, a protocol for anonymous communication.
机译:在信息隐藏中,尝试推断秘密信息的对手如果知道秘密的分布,则成功的可能性更高。我们表明,如果系统概率性地泄露了有关机密的某些信息(即,如果机密和某些可观察值之间存在概率相关性),那么对手可以通过重复观察来近似这种分布。更准确地说,它可以通过计算可观察对象的频率来近似它们的分布,然后通过使用反方向上的相关性来导出秘密上的分布。我们说明了这种方法,然后针对各种自然误差概念研究了与之相关的近似误差的界限。作为案例研究,我们将我们的结果应用于人群(一种匿名通信协议)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号