Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix
نویسندگان
چکیده
We study a statistical signal processing privacy problem, where an agent observes useful data $Y$ and wants to reveal the information user. Since is correlated with private notation="LaTeX">$X$ , employs mechanism generate notation="LaTeX">$U$ that can be released. design maximizes revealed about while satisfying strong notation="LaTeX">$\ell _{1}$ -privacy criterion. When sufficiently small leakage allowed, we show optimizer distributions of problem have specific geometry, i.e., they are perturbations fixed vector distributions. This geometrical structure allows us use local approximation conditional entropy. By using this original optimization reduced linear program so approximate solution for optimal easily obtained. The main contribution work consider non-invertible matrix non-zero leakage. In our first example, inspired by watermark application, demonstrate accuracy approximation. Then, employ different measures utility compare privacy-utility trade-off approach other methods. particular, allowing leakage, significant achieved method compared case no allowed. second third examples which based on MNIST set medical applications, illustrate suggested disclosed . It has been shown letters disclosing more combined (randomized) produce new letter
منابع مشابه
On data leakage from non-production systems
This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development lifecycle, non-production environments are used to serve various purposes to include unit, component, integration, system, user acceptance, performance and configuration testing. Organisations and third parties have been and are continuing to use copies ...
متن کاملLeakage-Resilient Non-malleable Codes
A recent trend in cryptography is to construct cryptosystems that are secure against physical attacks. Such attacks are usually divided into two classes: the leakage attacks in which the adversary obtains some information about the internal state of the machine, and the tampering attacks where the adversary can modify this state. One of the popular tools used to provide tamper-resistance are th...
متن کاملLeakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of side-channel attacks. Specifically, we consider a setting where a cheating verifier is allowed to obtain arbitrary bounded leakage on the entire state (including the witness and the random coins) of the prover during the entire protocol execution. We formalize a meaningful definition of leakage-resilient zero ...
متن کاملInformation Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes
A Helper Data Scheme is a cryptographic primitive that extracts a high-entropy noise-free string from noisy data. Helper Data Schemes are used for privacy-preserving databases and for Physical Unclonable Functions. We refine the theory of Helper Data schemes with Zero Secrecy Leakage (ZSL), i.e. the mutual information between the helper data and the extracted secret is zero. We prove that ZSL n...
متن کاملNon-Malleable Codes with Leakage and Applications to Secure Communication
Non-malleable codes are randomized codes that protect coded messages against modification by functions in a tampering function class. These codes are motivated by providing tamper resilience in applications where a cryptographic secret is stored in a tamperable storage device and the protection goal is to ensure that the adversary cannot benefit from their tamperings with the device. In this pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2022
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2021.3137755