Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols

  • Authors:
  • Abhishek Bhowmick;Catuscia Palamidessi

  • Affiliations:
  • Computer Science and Engineering, IIT Kanpur,;INRIA Saclay and LIX, Ecole Polytechnique,

  • Venue:
  • Trustworthy Global Computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by repeating the observations. More precisely, it can approximate the distribution on the observables by computing their frequencies, and then derive the distribution on the secrets by using the correlation in the inverse direction. We illustrate this method, and then we study the bounds on the approximation error associated with it, for various natural notions of error. As a case study, we apply our results to Crowds, a protocol for anonymous communication.