TY - GEN
T1 - Probability of error in information-hiding protocols
AU - Chatzikokolakis, Konstantinos
AU - Palamidessi, Catuscia
AU - Panangaden, Prakash
PY - 2007/10/16
Y1 - 2007/10/16
N2 - Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the inference when the MAP (Maximum Aposteriori Probability) decision rule is adopted. Our main result is a constructive characterization of a convex base of the probability of error, which allows us to compute its maximum value (over all possible input distributions), and to identify upper bounds for it in terms of simple functions. As a side result, we are able to improve substantially the Hellman-Raviv and the Santhi-Vardy bounds expressed in terms of conditional entropy. We then discuss an application of our methodology to the Crowds protocol, and in particular we show how to compute the bounds on the probability that an adversary breaks anonymity.
AB - Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the inference when the MAP (Maximum Aposteriori Probability) decision rule is adopted. Our main result is a constructive characterization of a convex base of the probability of error, which allows us to compute its maximum value (over all possible input distributions), and to identify upper bounds for it in terms of simple functions. As a side result, we are able to improve substantially the Hellman-Raviv and the Santhi-Vardy bounds expressed in terms of conditional entropy. We then discuss an application of our methodology to the Crowds protocol, and in particular we show how to compute the bounds on the probability that an adversary breaks anonymity.
U2 - 10.1109/CSF.2007.27
DO - 10.1109/CSF.2007.27
M3 - Conference contribution
AN - SCOPUS:35048859323
SN - 0769528198
SN - 9780769528199
T3 - Proceedings - IEEE Computer Security Foundations Symposium
SP - 341
EP - 351
BT - Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
T2 - 20th IEEE Computer Security Foundations Symposium, CSFS20
Y2 - 6 July 2007 through 8 July 2007
ER -