A geometric view of mutual information: Application to anonymity protocols

Sami Zhioua

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Anonymity protocols are a special type of security protocols that focus on protecting the identities of communicating entities in a network communication. In this research we explore the notion of anonymity from an information- theoretic point of view. We see a protocol as a noisy channel that links a set of anonymous events (inputs) to a set of observables (outputs). The degree of anonymity of the protocol can then be expressed in terms of how much information is being leaked by the channel. In information theory, the information leaked by a noisy channel is given by the notion of mutual information. We propose an alternative measure of information leakage based on the vector configuration of the noisy channel's matrix. We show that a variant of this new measure coincides with mutual information which gives an interesting geometric interpretation to mutual information.

Original languageEnglish
Title of host publicationISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications
Pages60-65
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2010
Externally publishedYes
Event2010 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010 - Taichung, Taiwan, Province of China
Duration: 17 Oct 201020 Oct 2010

Publication series

NameISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications

Conference

Conference2010 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010
Country/TerritoryTaiwan, Province of China
CityTaichung
Period17/10/1020/10/10

Fingerprint

Dive into the research topics of 'A geometric view of mutual information: Application to anonymity protocols'. Together they form a unique fingerprint.

Cite this