On Perfect Privacy
نویسندگان
چکیده
The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair dependent random variables (X, Y), where X and Y denote the useful data, respectively, following addressed: What maximum that can be revealed about Y, measured by mutual I(Y; U), in which U denotes while disclosing no X, captured condition statistical independence, i.e., ⊥ U, henceforth called perfect privacy)? We analyze supremization utility, U) under privacy for two scenarios: output perturbation full observation models, correspond to cases Markov kernel, privacy-preserving mapping, applies respectively. When both have finite alphabet, linear algebraic analysis involved solution provides some interesting results, such as upper/lower bounds on size released alphabet utility. Afterwards, it shown jointly Gaussian not possible model contrast model. Finally, asymptotic provided obtain rate when sufficiently small leakage allowed. In particular, context model, this always feasible, lower are it; mild conditions, becomes unbounded.
منابع مشابه
On Perfect Privacy and Maximal Correlation
The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair of correlated random variables (X,Y ), where Y denotes the observed data while X denotes the private latent variables, the following problem is addressed: What is the maximum information that can be revealed about Y , while disclosing no information about X? Assuming that a Markov ker...
متن کاملAlmost Perfect Privacy for Additive Gaussian Privacy Filters
We study the maximal mutual information about a random variable Y (representing non-private information) displayed through an additive Gaussian channel when guaranteeing that only ε bits of information is leaked about a random variable X (representing private information) that is correlated with Y . Denoting this quantity by gε(X,Y ), we show that for perfect privacy, i.e., ε = 0, one has g0(X,...
متن کاملPerfect Keyword Privacy in PEKS Systems
This paper presents a new security notion, called perfect keyword privacy (PKP), for non-interactive public-key encryption with keyword search (PEKS) [5]. Although the conventional security notion for PEKS guarantees that a searchable ciphertext leaks no information about keywords, it gives no guarantee concerning leakage of a keyword from the trapdoor. PKP is a notion for overcoming this fatal...
متن کاملPerfect Privacy for Webmail with Secret Sharing
With the many advantages of web-based mail comes a very serious privacy flaw – all messages are stored in a single central location on the webmail operator’s data center. This fact makes these data centers a natural interception point for various undesirable parties, severely risking the privacy of individual webmail users. We propose a novel and unique way to solve this problem and protect the...
متن کاملOn generalizations of semiperfect and perfect rings
We call a ring $R$ right generalized semiperfect if every simple right $R$-module is an epimorphic image of a flat right $R$-module with small kernel, that is, every simple right $R$-module has a flat $B$-cover. We give some properties of such rings along with examples. We introduce flat strong covers as flat covers which are also flat $B$-covers and give characterizations of $A$-perfe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal on selected areas in information theory
سال: 2021
ISSN: ['2641-8770']
DOI: https://doi.org/10.1109/jsait.2021.3053432