TY - CHAP
T1 - Posterior vulnerability and leakage
AU - Alvim, Mário S.
AU - Chatzikokolakis, Konstantinos
AU - McIver, Annabelle
AU - Morgan, Carroll
AU - Palamidessi, Catuscia
AU - Smith, Geoffrey
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - We recall from Chap. 3 that, given a secret X with prior distribution π, the “threat” to X can be measured as its g-vulnerability Vg(π) for a suitably chosen gain function g — where the choice of g reflects the circumstances, and the importance to us of the secret’s remaining undisclosed, and might vary depending on who “we” are and what adversary we are facing.
AB - We recall from Chap. 3 that, given a secret X with prior distribution π, the “threat” to X can be measured as its g-vulnerability Vg(π) for a suitably chosen gain function g — where the choice of g reflects the circumstances, and the importance to us of the secret’s remaining undisclosed, and might vary depending on who “we” are and what adversary we are facing.
U2 - 10.1007/978-3-319-96131-6_5
DO - 10.1007/978-3-319-96131-6_5
M3 - Chapter
AN - SCOPUS:85091601350
T3 - Information Security and Cryptography
SP - 71
EP - 100
BT - Information Security and Cryptography
PB - Springer Science and Business Media Deutschland GmbH
ER -