Posterior vulnerability and leakage

  • Mário S. Alvim
  • , Konstantinos Chatzikokolakis
  • , Annabelle McIver
  • , Carroll Morgan
  • , Catuscia Palamidessi
  • , Geoffrey Smith

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

We recall from Chap. 3 that, given a secret X with prior distribution π, the “threat” to X can be measured as its g-vulnerability Vg(π) for a suitably chosen gain function g — where the choice of g reflects the circumstances, and the importance to us of the secret’s remaining undisclosed, and might vary depending on who “we” are and what adversary we are facing.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer Science and Business Media Deutschland GmbH
Pages71-100
Number of pages30
DOIs
Publication statusPublished - 1 Jan 2020

Publication series

NameInformation Security and Cryptography
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Fingerprint

Dive into the research topics of 'Posterior vulnerability and leakage'. Together they form a unique fingerprint.

Cite this