TY - JOUR
T1 - Compositional methods for information-hiding
AU - Chatzikokolakis, Konstantinos
AU - Palamidessi, Catuscia
AU - Braun, Christelle
N1 - Publisher Copyright:
© Cambridge University Press 2014.
PY - 2016/9/1
Y1 - 2016/9/1
N2 - Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information. We consider a probabilistic process calculus to specify such systems, and we study how the operators affect the probability of error. In particular, we characterize constructs that have the property of not decreasing the degree of protection, and that can therefore be considered safe in the modular construction of these systems. As a case study, we apply these techniques to the dining cryptographers, and we derive a generalization of Chaum's strong anonymity result.
AB - Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information. We consider a probabilistic process calculus to specify such systems, and we study how the operators affect the probability of error. In particular, we characterize constructs that have the property of not decreasing the degree of protection, and that can therefore be considered safe in the modular construction of these systems. As a case study, we apply these techniques to the dining cryptographers, and we derive a generalization of Chaum's strong anonymity result.
U2 - 10.1017/S0960129514000292
DO - 10.1017/S0960129514000292
M3 - Article
AN - SCOPUS:84982834078
SN - 0960-1295
VL - 26
SP - 908
EP - 932
JO - Mathematical Structures in Computer Science
JF - Mathematical Structures in Computer Science
IS - 6
ER -