Composable Bounds on Information Flow from Distribution Differences

نویسندگان

  • Megumi Ando
  • Joshua D. Guttman
چکیده

We define information leakage in terms of a “difference” between the a priori distribution over some remote behavior and the a posteriori distribution of the remote behavior conditioned on a local observation from a protocol run. Either a maximum or an average may be used. We identify a set of notions of “difference;” we show that they reduce our general leakage notion to various definitions in the literature. We also prove general composability theorems analogous to the dataprocessing inequality for mutual information, or cascading channels for channel capacities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Universally Composable Privacy Amplification Against Quantum Adversaries

Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable k...

متن کامل

Composable Privacy Amplification Against Quantum Adversaries ∗

Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable k...

متن کامل

Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited

In this paper, we revisit formalizations of information-theoretic security for symmetric-key encryption and key agreement protocols which are very fundamental primitives in cryptography. In general, we can formalize information-theoretic security in various ways: some of them can be formalized as stand-alone security by extending (or relaxing) Shannon’s perfect secrecy; some of them can be done...

متن کامل

Finite-key analysis for time-energy high-dimensional quantum key distribution

Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature of time-energy entangled biphotons and the loss tolerance from the discrete nature of single-photon detection thus enabling long-distance key distribution with high photon information efficiency (PIE). However, the security of HD-QKD has only been proven in the asymptotic regime, or in the finit...

متن کامل

Admission Effects on the Flow Behaviour of a Double Entry Turbocharger Turbine

Dual turbocharger turbine is fed by an unequal out-of-phase mass flow charge almost all the time which have significant effects on its performance parameters and flow phenomena which are not well known. Besides fully understanding the flow behavior in the radial turbine suffers from lack of detailed information about the secondary flows. This article studies the secondary flow structure within ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015