Cornell University
Library
Cornell UniversityLibrary

eCommons

Help
Log In(current)
  1. Home
  2. Cornell University Graduate School
  3. Cornell Theses and Dissertations
  4. An Operational Approach to Information Leakage

An Operational Approach to Information Leakage

File(s)
Issa_cornellgrad_0058F_10519.pdf (720.73 KB)
Permanent Link(s)
https://doi.org/10.7298/X49G5JZZ
https://hdl.handle.net/1813/56721
Collections
Cornell Theses and Dissertations
Author
Issa, Ibrahim
Abstract

Given two random variables $X$ and $Y$, how much information does $Y$ ``leak'' about $X$? An operational approach is undertaken to answer this question, which is fundamental to the study of communication security. The resulting measure ${\mathcal{L}(X !! \to !! Y)}$ is called \emph{maximal leakage}, and is defined as the multiplicative increase, upon observing $Y$, of the probability of correctly guessing a randomized function of $X$, maximized over all such randomized functions. A closed form expression for $\mathcal{L}(X !! \to !! Y)$ is given for discrete $X$ and $Y$, and it is subsequently generalized to handle a large class of random variables.
The resulting properties are shown to be consistent with an axiomatic view of a leakage measure, and the definition is shown to be robust to variations in the setup. Moreover, the \emph{guessing} framework is used to give operational definitions to commonly used leakage measures, such as Shannon capacity, maximal correlation, and local differential privacy. Counter-intuitively, it is shown that Shannon capacity \emph{underestimates} leakage. Furthermore, a variant of the Shannon cipher system is studied, in which performance of an encryption scheme is measured using maximal leakage. A single-letter characterization of the optimal limit of (normalized) maximal leakage is derived and asymptotically-optimal encryption schemes are demonstrated. The Shannon cipher system is also studied when there is a known distortion function up to which the adversary is interested in $X$, in which case the relevant metric is the (exponent of the) probability of a successful guess. A single-letter characterization of the highest achievable exponent is provided, and asymptotically-optimal strategies for both the primary user and the adversary are demonstrated. Finally, the sample complexity of estimating maximal leakage from data is studied. It is shown that the task is possibly only if the minimum strictly positive probability of a source symbol, $\theta$, is known. In that case, $\mathcal{O} \left( \frac{|\mathcal{Y}| \log |\mathcal{X}|}{\theta} \right)$ samples are sufficient, and $\Omega (|\mathcal{Y}|^{1-\eta}/\theta)$ samples, for any $\eta > 0$, are necessary.

Date Issued
2017-08-30
Keywords
Electrical engineering
•
Information science
•
Guessing
•
Information leakage
•
Maximal leakage
•
Sibson mutual information
Committee Chair
Wagner, Aaron B.
Committee Member
Acharya, Jayadev
Wicker, Stephen B.
Suh, Gookwon Edward
Degree Discipline
Electrical and Computer Engineering
Degree Name
Ph. D., Electrical and Computer Engineering
Degree Level
Doctor of Philosophy
Type
dissertation or thesis

Site Statistics | Help

About eCommons | Policies | Terms of use | Contact Us

copyright © 2002-2026 Cornell University Library | Privacy | Web Accessibility Assistance