eCommons

 

An Operational Approach to Information Leakage

Other Titles

Abstract

Given two random variables X and Y, how much information does Y ``leak'' about X? An operational approach is undertaken to answer this question, which is fundamental to the study of communication security. The resulting measure L(XY) is called \emph{maximal leakage}, and is defined as the multiplicative increase, upon observing Y, of the probability of correctly guessing a randomized function of X, maximized over all such randomized functions. A closed form expression for L(XY) is given for discrete X and Y, and it is subsequently generalized to handle a large class of random variables.
The resulting properties are shown to be consistent with an axiomatic view of a leakage measure, and the definition is shown to be robust to variations in the setup. Moreover, the \emph{guessing} framework is used to give operational definitions to commonly used leakage measures, such as Shannon capacity, maximal correlation, and local differential privacy. Counter-intuitively, it is shown that Shannon capacity \emph{underestimates} leakage. Furthermore, a variant of the Shannon cipher system is studied, in which performance of an encryption scheme is measured using maximal leakage. A single-letter characterization of the optimal limit of (normalized) maximal leakage is derived and asymptotically-optimal encryption schemes are demonstrated. The Shannon cipher system is also studied when there is a known distortion function up to which the adversary is interested in X, in which case the relevant metric is the (exponent of the) probability of a successful guess. A single-letter characterization of the highest achievable exponent is provided, and asymptotically-optimal strategies for both the primary user and the adversary are demonstrated. Finally, the sample complexity of estimating maximal leakage from data is studied. It is shown that the task is possibly only if the minimum strictly positive probability of a source symbol, θ, is known. In that case, O(|Y|log⁡|X|θ) samples are sufficient, and Ω(|Y|1−η/θ) samples, for any η>0, are necessary.

Journal / Series

Volume & Issue

Description

Sponsorship

Date Issued

2017-08-30

Publisher

Keywords

Electrical engineering; Information science; Guessing; Information leakage; Maximal leakage; Sibson mutual information

Location

Effective Date

Expiration Date

Sector

Employer

Union

Union Local

NAICS

Number of Workers

Committee Chair

Wagner, Aaron B.

Committee Co-Chair

Committee Member

Acharya, Jayadev
Wicker, Stephen B.
Suh, Gookwon Edward

Degree Discipline

Electrical and Computer Engineering

Degree Name

Ph. D., Electrical and Computer Engineering

Degree Level

Doctor of Philosophy

Related Version

Related DOI

Related To

Related Part

Based on Related Item

Has Other Format(s)

Part of Related Item

Related To

Related Publication(s)

Link(s) to Related Publication(s)

References

Link(s) to Reference(s)

Previously Published As

Government Document

ISBN

ISMN

ISSN

Other Identifiers

Rights

Rights URI

Types

dissertation or thesis

Accessibility Feature

Accessibility Hazard

Accessibility Summary

Link(s) to Catalog Record