Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix

نویسندگان

چکیده

We study a statistical signal processing privacy problem, where an agent observes useful data $Y$ and wants to reveal the information user. Since is correlated with private notation="LaTeX">$X$ , employs mechanism generate notation="LaTeX">$U$ that can be released. design maximizes revealed about while satisfying strong notation="LaTeX">$\ell _{1}$ -privacy criterion. When sufficiently small leakage allowed, we show optimizer distributions of problem have specific geometry, i.e., they are perturbations fixed vector distributions. This geometrical structure allows us use local approximation conditional entropy. By using this original optimization reduced linear program so approximate solution for optimal easily obtained. The main contribution work consider non-invertible matrix non-zero leakage. In our first example, inspired by watermark application, demonstrate accuracy approximation. Then, employ different measures utility compare privacy-utility trade-off approach other methods. particular, allowing leakage, significant achieved method compared case no allowed. second third examples which based on MNIST set medical applications, illustrate suggested disclosed . It has been shown letters disclosing more combined (randomized) produce new letter

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On data leakage from non-production systems

This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development lifecycle, non-production environments are used to serve various purposes to include unit, component, integration, system, user acceptance, performance and configuration testing. Organisations and third parties have been and are continuing to use copies ...

متن کامل

Leakage-Resilient Non-malleable Codes

A recent trend in cryptography is to construct cryptosystems that are secure against physical attacks. Such attacks are usually divided into two classes: the leakage attacks in which the adversary obtains some information about the internal state of the machine, and the tampering attacks where the adversary can modify this state. One of the popular tools used to provide tamper-resistance are th...

متن کامل

Leakage-Resilient Zero Knowledge

In this paper, we initiate a study of zero knowledge proof systems in the presence of side-channel attacks. Specifically, we consider a setting where a cheating verifier is allowed to obtain arbitrary bounded leakage on the entire state (including the witness and the random coins) of the prover during the entire protocol execution. We formalize a meaningful definition of leakage-resilient zero ...

متن کامل

Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes

A Helper Data Scheme is a cryptographic primitive that extracts a high-entropy noise-free string from noisy data. Helper Data Schemes are used for privacy-preserving databases and for Physical Unclonable Functions. We refine the theory of Helper Data schemes with Zero Secrecy Leakage (ZSL), i.e. the mutual information between the helper data and the extracted secret is zero. We prove that ZSL n...

متن کامل

Non-Malleable Codes with Leakage and Applications to Secure Communication

Non-malleable codes are randomized codes that protect coded messages against modification by functions in a tampering function class. These codes are motivated by providing tamper resilience in applications where a cryptographic secret is stored in a tamperable storage device and the protection goal is to ensure that the adversary cannot benefit from their tamperings with the device. In this pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2022

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3137755