Bounds on the leakage of the input's distribution in information-hiding protocols - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

Bounds on the leakage of the input's distribution in information-hiding protocols

Résumé

In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by repeating the observations. More precisely, it can approximate the distribution on the observables by computing their frequencies, and then derive the distribution on the secrets by using the correlation in the inverse direction. We illustrate this method, and then we study the bounds on the approximation error associated with it, for various natural notions of error. As a case study, we apply our results to Crowds, a protocol for anonymous communication.
Fichier principal
Vignette du fichier
report.pdf (193.36 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00444579 , version 1 (07-01-2010)

Identifiants

  • HAL Id : hal-00444579 , version 1

Citer

Abhishek Bhowmick, Catuscia Palamidessi. Bounds on the leakage of the input's distribution in information-hiding protocols. Fourth Symposium on Trustworthy Global Computing (TGC), 2008, France. pp.36--51. ⟨hal-00444579⟩
348 Consultations
168 Téléchargements

Partager

Gmail Facebook X LinkedIn More