On the Bayes risk in information-hiding protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Bayes risk in information-hiding protocols

Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the MAP (Maximum Aposteriori Probability) inference rule. Our main result ...

متن کامل

Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols

In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by re...

متن کامل

the impact of e-readiness on ec success in public sector in iran the impact of e-readiness on ec success in public sector in iran

acknowledge the importance of e-commerce to their countries and to survival of their businesses and in creating and encouraging an atmosphere for the wide adoption and success of e-commerce in the long term. the investment for implementing e-commerce in the public sector is one of the areas which is focused in government‘s action plan for cross-disciplinary it development and e-readiness in go...

Information Hiding in Parallel Programs Information Hiding in Parallel Programs

ions that together allow these decisions to be isolated and hidden. Virtual topolo-gies, virtual channels, and lightweight processes provide mechanisms for isolating mapping,communication, and scheduling decisions, while port arrays allow these techniques to beapplied to program components that must execute on many processors.In addition to describing the abstractions, we have s...

متن کامل

On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols

The concept of witness-hiding suggested by Feige and Shamir is a natural relaxation of zero-knowledge. In this paper we identify languages and distributions for which many known constant-round publiccoin protocols with negligible soundness cannot be shown to be witnesshiding using black-box techniques. One particular consequence of our results is that parallel repetition of either 3-Colorabilit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2008

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-2008-0333