Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. An Operational Approach to Information Leakage
 
research article

An Operational Approach to Information Leakage

Issa, Ibrahim  
•
Wagner, Aaron B.
•
Kamath, Sudeep
March 1, 2020
Ieee Transactions On Information Theory

Given two random variables X and Y , an operational approach is undertaken to quantify the "leakage" of information from X to Y . The resulting measure L (X -> Y) is called maximal leakage, and is defined as the multiplicative increase, upon observing Y , of the probability of correctly guessing a randomized function of X , maximized over all such randomized functions. A closed-form expression for L(X -> Y) is given for discrete X and Y , and it is subsequently generalized to handle a large class of random variables. The resulting properties are shown to be consistent with an axiomatic view of a leakage measure, and the definition is shown to be robust to variations in the setup. Moreover, a variant of the Shannon cipher system is studied, in which performance of an encryption scheme is measured using maximal leakage. A single-letter characterization of the optimal limit of (normalized) maximal leakage is derived and asymptotically-optimal encryption schemes are demonstrated. Furthermore, the sample complexity of estimating maximal leakage from data is characterized up to subpolynomial factors. Finally, the guessing framework used to define maximal leakage is used to give operational interpretations of commonly used leakage measures, such as Shannon capacity, maximal correlation, and local differential privacy.

  • Details
  • Metrics
Type
research article
DOI
10.1109/TIT.2019.2962804
Web of Science ID

WOS:000519925900021

Author(s)
Issa, Ibrahim  
Wagner, Aaron B.
Kamath, Sudeep
Date Issued

2020-03-01

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC

Published in
Ieee Transactions On Information Theory
Volume

66

Issue

3

Start page

1625

End page

1657

Subjects

Computer Science, Information Systems

•

Engineering, Electrical & Electronic

•

Computer Science

•

Engineering

•

guessing

•

information leakage

•

security

•

sibson mutual information

•

shannon cipher system

•

rate-distortion theory

•

coding theorems

•

secrecy

•

privacy

•

entropy

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LINX  
Available on Infoscience
April 2, 2020
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/167791
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés