Author:
BOREALE MICHELE,PAMPALONI FRANCESCA,PAOLINI MICHELA
Abstract
We study the asymptotic behaviour of (a) information leakage and (b) adversary's error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n show that the convergence is exponential. We also discuss feasible methods to evaluate the rate of convergence. Our results cover both the Bayesian case, where an a priori probability distribution on the secrets is assumed known to the attacker, and the maximum-likelihood case, where the attacker does not know such distribution. In the Bayesian case, we identify the distributions that maximize leakage. We consider both the min-entropy setting studied by Smith and the additive form recently proposed by Braun et al. and show the two forms do agree asymptotically. Next, we extend these results to a more sophisticated eavesdropping scenario, where the attacker can perform a (noisy) observation at each state of the computation and the systems are modelled as hidden Markov models.
Publisher
Cambridge University Press (CUP)
Subject
Computer Science Applications,Mathematics (miscellaneous)
Reference29 articles.
1. Anonymous connections and onion routing
2. Compositional Methods for Information-Hiding
3. A tutorial on hidden Markov models and selected applications in speech recognition
4. Mantel H. and Sudbrock H. (2008) Information-theoretic modelling and analysis of interrupt-related covert channels. Formal Aspects in Security and Trust 67–81.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Information Leakage Games: Exploring Information as a Utility Function;ACM Transactions on Privacy and Security;2022-04-09
2. QQIF: Quantum Quantitative Information Flow (invited paper);2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2020-09
3. Information leakage of multi-threaded programs;Computers & Electrical Engineering;2019-09
4. Deterministic Channel Design for Minimum Leakage;2019 IEEE 32nd Computer Security Foundations Symposium (CSF);2019-06
5. Worst- and average-case privacy breaches in randomization mechanisms;Theoretical Computer Science;2015-09