Filters








2,179 Hits in 1.7 sec

Axioms for Information Leakage

Mario S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith
2016 2016 IEEE 29th Computer Security Foundations Symposium (CSF)  
To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms.  ...  Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems.  ...  INTRODUCTION The theory of quantitative information flow has seen rapid development over the past decade, motivated by the need for rigorous techniques to assess and control the leakage of sensitive information  ... 
doi:10.1109/csf.2016.13 dblp:conf/csfw/AlvimCMMPS16 fatcat:gns24qljy5g4tcmdkb3z2467zm

An axiomatization of information flow measures

Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith
2019 Theoretical Computer Science  
To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms.  ...  Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems.  ...  And hence refinement is also sound for the new leakage measure. Another application concerns the possibility of negative leakage for some information measures.  ... 
doi:10.1016/j.tcs.2018.10.016 fatcat:mqhzmgcxzbdrfhydxbjojz2pcq

A Self-Healing Cryptosystem Design Prevent from Side-Channel Attack

Jian Bo Yao, Tao Zhang
2012 Advanced Engineering Forum  
And then, a masking update technique is applied for making the side-channel leakage invalid.  ...  In view of existing cryptosystem of Side-channel leakage of safe hidden trouble, this paper presents a kind of self-healing properties with the cryptosystem design method.  ...  Axiom 1 gives Side-channel leakage producing situations, on the basis of Axiom 1, given measuring effectiveness points are defined as follows: Define 1: for key related state set 1 2 n R={r , r ,...r  ... 
doi:10.4028/www.scientific.net/aef.6-7.200 fatcat:azsp6uhnqrai7fo3iqrr7abp6y

Measuring Information Leakage in Non-stochastic Brute-Force Guessing

Farhad Farokhi, Ni Ding
2021 2020 IEEE Information Theory Workshop (ITW)  
a measure of private information leakage.  ...  We investigate the relationship between the newly-developed measure of information leakage with maximin information and stochastic maximal leakage that are shown to arise in one-shot guessing.  ...  These axioms are, in fact, relevant to any notion of information leakage.  ... 
doi:10.1109/itw46852.2021.9457602 fatcat:2gh5seppd5b5hlvsuhz4dneq4e

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks [chapter]

François-Xavier Standaert, Tal G. Malkin, Moti Yung
2009 Lecture Notes in Computer Science  
It allows us to quantify the effect of practically relevant leakage functions with a combination of security and information theoretic metrics.  ...  François-Xavier Standaert is a post doctoral researcher funded by the FNRS (Funds for  ...  Acknowledgements: The authors would like to acknowledge Leonid Reyzin for his valuable contributions to the development and understanding of the issues discussed in the paper.  ... 
doi:10.1007/978-3-642-01001-9_26 fatcat:yb6h5btb4fhhpg7ffgw5gdrph4

Measuring Information Leakage in Non-stochastic Brute-Force Guessing [article]

Farhad Farokhi, Ni Ding
2021 arXiv   pre-print
a measure of private information leakage.  ...  We investigate the relationship between the newly-developed measure of information leakage with the existing non-stochastic maximin information and stochastic maximal leakage that are shown arise in one-shot  ...  These axioms are, in fact, relevant to any notion of information leakage.  ... 
arXiv:2004.10911v2 fatcat:dnmexbt7ivd6ba4h5rseqmqvha

Automatic Security Detection for Access Control Based on Guided Deep Testing

2016 Journal of Network Computing and ApplicationsJournal of Network Computing and Applications  
Security detection for access control model by testing whether there is permission leakage, is the key measure to evaluate access control system security.  ...  Introduction Information leakage in access control [1] has become a major problem in the past decades, which lead to a continuous potential threat to the information system.  ...  Violations of the information dissemination often interrelated with permission leakage. Step 4.  ... 
doi:10.23977/jnca.2016.11007 fatcat:5vysa3tqxra2bkzie2wuq6cjpi

The Physically Observable Security of Signature Schemes [chapter]

Alexander W. Dent, John Malone-Lee
2005 Lecture Notes in Computer Science  
An increasingly popular environment for cryptographic implementation is the smart-card.  ...  In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models.  ...  Axiom 3 Information leakage depends upon the chosen measurement.  ... 
doi:10.1007/11586821_15 fatcat:3mnm2ssmzjc6jfh2fmgt6zom3y

Composable Bounds on Information Flow from Distribution Differences [chapter]

Megumi Ando, Joshua D. Guttman
2016 Lecture Notes in Computer Science  
We also prove general composability theorems analogous to the dataprocessing inequality for mutual information, or cascading channels for channel capacities.  ...  We define information leakage in terms of a "difference" between the a priori distribution over some remote behavior and the a posteriori distribution of the remote behavior conditioned on a local observation  ...  Rushanan, and the reviewers of this paper for helpful comments.  ... 
doi:10.1007/978-3-319-29883-2_2 fatcat:jdpinrcd4vha5nt3joewpike24

Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing

Ziyi Han, Li Yang, Shen Wang, Sen Mu, Qiang Liu
2018 Wireless Communications and Mobile Computing  
As thus, once the server is hacked by attackers to cause the leakage of the fingerprint information, it will take a deadly threat to the user privacy.  ...  Unfortunately, in the existing scheme, biometric information is stored on the server side.  ...  fingerprint information leakage in the server side.  ... 
doi:10.1155/2018/9149730 fatcat:snuxh6wzb5bkfec5ydwjxc7wna

Physically Observable Cryptography [chapter]

Silvio Micali, Leonid Reyzin
2004 Lecture Notes in Computer Science  
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that exploit the information leakage (via electromagnetic fields, power consumption  ...  Our general model allows for a variety of adversaries.  ...  Intuition for Physically Observable Computation Our model for physically observable (PO for short) computation is based on the following (overlapping) Informal Axioms Computation, and only computation  ... 
doi:10.1007/978-3-540-24638-1_16 fatcat:tyvucrxggrbvxgcjbko6hjlria

Quantifying Dynamic Leakage: Complexity Analysis and Model Counting-based Calculation [article]

Bao Trung Chu, Kenji Hashimoto, Hiroyuki Seki
2019 arXiv   pre-print
This counter-intuition raises a need for a new definition of information leakage of a particular run, i.e., dynamic leakage.  ...  As discussed in [5], entropy-based definitions do not work well for quantifying information leakage dynamically; Belief-based definition on the other hand is appropriate for deterministic programs, however  ...  Note that these axioms are for static QIF measures, which differ from dynamic leakage.  ... 
arXiv:1903.03802v1 fatcat:xubrcckohncrxavpvqw22wuewq

Quantifying Dynamic Leakage - Complexity Analysis and Model Counting-based Calculation -

Bao Trung CHU, Kenji HASHIMOTO, Hiroyuki SEKI
2019 IEICE transactions on information and systems  
This counter-intuition raises a need for a new definition of information leakage of a particular run, i.e., dynamic leakage.  ...  As discussed in [5], entropybased definitions do not work well for quantifying information leakage dynamically; Belief-based definition on the other hand is appropriate for deterministic programs, however  ...  Acknowledgements The authors thank the reviewers for providing invaluable comments to the paper. This work was supported by JSPS KAKENHI Grant Numbers JP17K00098, JP19H04083.  ... 
doi:10.1587/transinf.2019edp7132 fatcat:qqkipgtourgc3eaxhyl6r5vgbu

Directed Information as Privacy Measure in Cloud-based Control [article]

Takashi Tanaka, Mikael Skoglund, Henrik Sandberg, Karl Henrik Johansson
2017 arXiv   pre-print
In order to address privacy concerns in such a control architecture, we first investigate the issue of finding an appropriate privacy measure for clients who desire to keep local state information as private  ...  Specifically, we justify the use of Kramer's notion of causally conditioned directed information as a measure of privacy loss based on an axiomatic argument.  ...  Postulate 2 (Data-processing axiom [24] ) For any distribution P X,Y on X × Y, the information leakage function L( , P X,Y ) satisfies L( , P T (X),Y ) = L( , P X,Y ) (1) for every T : X → X such that  ... 
arXiv:1705.02802v1 fatcat:nwxib3ghpfe3zc7b46qmpozdu4

FRAME: Evaluating Simulatability Metrics for Free-Text Rationales [article]

Aaron Chan, Shaoliang Nie, Liang Tan, Xiaochang Peng, Hamed Firooz, Maziar Sanjabi, Xiang Ren
2022 arXiv   pre-print
FRAME is based on three axioms: (1) good metrics should yield highest scores for reference rationales, which maximize rationale-label association by construction; (2) good metrics should be appropriately  ...  To investigate this, we propose FRAME, a framework for evaluating free-text rationale simulatability metrics.  ...  Axiom 1, for both GH-GOLD and NP-GH-PRED.  ... 
arXiv:2207.00779v1 fatcat:33dgea7nkzdhlbns3owd5qbk5q
« Previous Showing results 1 — 15 out of 2,179 results