A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
نویسندگان
چکیده
In this paper, we propose a novel layering approach to achieve end-to-end exponential security without resorting to presumed physical layer conditions. The only requirement for such an exponentially secure system is existence of a common key source between legitimate users that is partially known by Eve. The novel framework includes a random cipher and key stream generating scheme constituting the first layer and universal hash forming the second layer. The key generating scheme is based on a novel definition of a randomness extractor that derives a key stream with the required entropy from the common source, to be used for cipher. All metrics involved in characterizing the quality of secrecy of two-layer components are related to Rényi entropy and conditional Rényi entropy, which are all ultimately captured in the adopted information leakage metrics: mutual information and Eve’s distinguishability based on L 1 norm distance from uniformity. Such relationships are exploited to optimize the resulting bounds for secrecy exponents by selecting appropriate operating parameters including required key rate and source entropies, as well as the required guessing error rate by Eve to attack the first layer. © 2016 Elsevier Inc. All rights reserved.
منابع مشابه
Information Leakage of Heterogeneous Encoded Correlated Sequences over Eavesdropped Channel
Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources. Here correlated sources across an eavesdropped channel that incorporate a heterogeneous encoding scheme and their effect on the information leakage when some channel information and a source have been wiretapped is investigated. The information leakage bounds ...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملDifferential Privacy versus Quantitative Information Flow
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different entries to originate a certain answer is bound by e. In the fields of anonymity and information flow there is a similar concern for controlling inf...
متن کاملQuantitative Information Flow and Applications to Differential Privacy
Secure information flow is the problem of ensuring that the information made publicly available by a computational system does not leak information that should be kept secret. Since it is practically impossible to avoid leakage entirely, in recent years there has been a growing interest in considering the quantitative aspects of information flow, in order to measure and compare the amount of le...
متن کاملCompressing Encrypted Data and Permutation Cipher
In a system that performs both encryption and lossy compression, the conventional way is to compress first and then encrypt the compressed data. This separation approach proves to be optimal. In certain applications where sensitive information should be protected as early as possible, it is preferable to perform encryption first and then compress the encrypted data, which leads to the concept o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Sci.
دوره 357 شماره
صفحات -
تاریخ انتشار 2016