Robustness

  • Mário S. Alvim
  • , Konstantinos Chatzikokolakis
  • , Annabelle McIver
  • , Carroll Morgan
  • , Catuscia Palamidessi
  • , Geoffrey Smith

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Given a channel with input X, we have now seen that g-leakage provides us with a rich variety of ways to measure the information leakage of X that the channel causes. The prior models the adversary’s prior knowledge about X; the gain function g models the operational scenario, which encompasses both the set of actions that the adversary can take and also the worth to the adversary of each such action, for each possible value of X; and the choice of multiplicative- or additive leakage allows us to measure either the relative or the absolute increase in g-vulnerability.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer Science and Business Media Deutschland GmbH
Pages101-105
Number of pages5
DOIs
Publication statusPublished - 1 Jan 2020

Publication series

NameInformation Security and Cryptography
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Fingerprint

Dive into the research topics of 'Robustness'. Together they form a unique fingerprint.

Cite this