Composable Bounds on Information Flow from Distribution Differences
نویسندگان
چکیده
We define information leakage in terms of a “difference” between the a priori distribution over some remote behavior and the a posteriori distribution of the remote behavior conditioned on a local observation from a protocol run. Either a maximum or an average may be used. We identify a set of notions of “difference;” we show that they reduce our general leakage notion to various definitions in the literature. We also prove general composability theorems analogous to the dataprocessing inequality for mutual information, or cascading channels for channel capacities.
منابع مشابه
Universally Composable Privacy Amplification Against Quantum Adversaries
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable k...
متن کاملComposable Privacy Amplification Against Quantum Adversaries ∗
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable k...
متن کاملFormalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encryption and key agreement protocols which are very fundamental primitives in cryptography. In general, we can formalize information-theoretic security in various ways: some of them can be formalized as stand-alone security by extending (or relaxing) Shannon’s perfect secrecy; some of them can be done...
متن کاملFinite-key analysis for time-energy high-dimensional quantum key distribution
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature of time-energy entangled biphotons and the loss tolerance from the discrete nature of single-photon detection thus enabling long-distance key distribution with high photon information efficiency (PIE). However, the security of HD-QKD has only been proven in the asymptotic regime, or in the finit...
متن کاملAdmission Effects on the Flow Behaviour of a Double Entry Turbocharger Turbine
Dual turbocharger turbine is fed by an unequal out-of-phase mass flow charge almost all the time which have significant effects on its performance parameters and flow phenomena which are not well known. Besides fully understanding the flow behavior in the radial turbine suffers from lack of detailed information about the secondary flows. This article studies the secondary flow structure within ...
متن کامل