On Perfect Privacy

نویسندگان

چکیده

The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair dependent random variables (X, Y), where X and Y denote the useful data, respectively, following addressed: What maximum that can be revealed about Y, measured by mutual I(Y; U), in which U denotes while disclosing no X, captured condition statistical independence, i.e., ⊥ U, henceforth called perfect privacy)? We analyze supremization utility, U) under privacy for two scenarios: output perturbation full observation models, correspond to cases Markov kernel, privacy-preserving mapping, applies respectively. When both have finite alphabet, linear algebraic analysis involved solution provides some interesting results, such as upper/lower bounds on size released alphabet utility. Afterwards, it shown jointly Gaussian not possible model contrast model. Finally, asymptotic provided obtain rate when sufficiently small leakage allowed. In particular, context model, this always feasible, lower are it; mild conditions, becomes unbounded.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Perfect Privacy and Maximal Correlation

The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair of correlated random variables (X,Y ), where Y denotes the observed data while X denotes the private latent variables, the following problem is addressed: What is the maximum information that can be revealed about Y , while disclosing no information about X? Assuming that a Markov ker...

متن کامل

Almost Perfect Privacy for Additive Gaussian Privacy Filters

We study the maximal mutual information about a random variable Y (representing non-private information) displayed through an additive Gaussian channel when guaranteeing that only ε bits of information is leaked about a random variable X (representing private information) that is correlated with Y . Denoting this quantity by gε(X,Y ), we show that for perfect privacy, i.e., ε = 0, one has g0(X,...

متن کامل

Perfect Keyword Privacy in PEKS Systems

This paper presents a new security notion, called perfect keyword privacy (PKP), for non-interactive public-key encryption with keyword search (PEKS) [5]. Although the conventional security notion for PEKS guarantees that a searchable ciphertext leaks no information about keywords, it gives no guarantee concerning leakage of a keyword from the trapdoor. PKP is a notion for overcoming this fatal...

متن کامل

Perfect Privacy for Webmail with Secret Sharing

With the many advantages of web-based mail comes a very serious privacy flaw – all messages are stored in a single central location on the webmail operator’s data center. This fact makes these data centers a natural interception point for various undesirable parties, severely risking the privacy of individual webmail users. We propose a novel and unique way to solve this problem and protect the...

متن کامل

On generalizations of semiperfect and perfect rings

‎We call a ring $R$ right generalized semiperfect if every simple right $R$-module is an epimorphic image of a flat right $R$-module with small kernel‎, ‎that is‎, ‎every simple right $R$-module has a flat $B$-cover‎. ‎We give some properties of such rings along with examples‎. ‎We introduce flat strong covers as flat covers which are also flat $B$-covers and give characterizations of $A$-perfe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE journal on selected areas in information theory

سال: 2021

ISSN: ['2641-8770']

DOI: https://doi.org/10.1109/jsait.2021.3053432