Abstract
Theories of quantitative information flow offer an attractive framework for analyzing confidentiality in practical systems, which often cannot avoid “small” leaks of confidential information. Recently there has been growing interest in the theory of min-entropy leakage, which measures uncertainty based on a random variable’s vulnerability to being guessed in one try by an adversary. Here we contribute to this theory by studying the min-entropy leakage of systems formed by cascading two channels together, using the output of the first channel as the input to the second channel. After considering the semantics of cascading carefully and exposing some technical subtleties, we prove that the min-entropy leakage of a cascade of two channels cannot exceed the leakage of the first channel; this result is a min-entropy analogue of the classic data-processing inequality. We show however that a comparable bound does not hold for the second channel. We then consider the min-capacity, or maximum leakage over all a priori distributions, showing that the min-capacity of a cascade of two channels cannot exceed the min-capacity of either channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abramson, N.: Information Theory and Coding. McGraw-Hill (1963)
Alvim, M., Andrés, M., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential Privacy: On the Trade-off between Utility and Information Leakage. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol. 7140, pp. 39–54. Springer, Heidelberg (2012)
Alvim, M., Andrés, M., Palamidessi, C.: Probabilistic information flow. In: Proc. 25th IEEE Symposium on Logic in Computer Science (LICS 2010), pp. 314–321 (2010)
Andrés, M., Palamidessi, C., van Rossum, P., Smith, G.: Computing the Leakage of Information-Hiding Systems. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol. 6015, pp. 373–389. Springer, Heidelberg (2010)
Barthe, G., Köpf, B.: Information-theoretic bounds for differentially private mechanisms. In: Proc. 24th IEEE Computer Security Foundations Symposium (CSF 2011), pp. 191–204 (2011)
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proc. 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009). ENTCS, vol. 249, pp. 75–91 (2009)
Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation 18(2), 181–199 (2005)
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. John Wiley & Sons, Inc. (2006)
Desoer, C.A.: Communication through channels in cascade. Ph.D. thesis, Massachusetts Institute of Technology (1953)
Dwork, C.: A firm foundation for private data analysis. Communications of the ACM 54(1) (2011)
El-Sayed, A.B.: Cascaded channels and the equivocation inequality. Metrika 25, 193–208 (1978)
Gallager, R.G.: Information Theory and Reliable Communication. John Wiley & Sons, Inc. (1968)
Hamadou, S., Sassone, V., Palamidessi, C.: Reconciling belief and vulnerability in information flow. In: Proc. 31st IEEE Symposium on Security and Privacy, pp. 79–92 (2010)
Kiely, A.B., Coffey, J.T.: On the capacity of a cascade of channels. IEEE Transactions on Information Theory 39(4), 1310–1321 (1993)
Köpf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proc. 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 286–296 (2007)
Köpf, B., Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: Proc. 23nd IEEE Computer Security Foundations Symposium (CSF 2010), pp. 44–56 (2010)
MacKay, D.J.: Information Theory, Inference, and Learning Algorithms. Cambridge University Press (2003)
Rényi, A.: On measures of entropy and information. In: Proc. 4th Berkeley Symposium on Mathematics, Statistics and Probability 1960, pp. 547–561 (1961)
Rényi, A.: Foundations of Probability. Holden-Day, Inc. (1970)
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)
Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288–302. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Espinoza, B., Smith, G. (2012). Min-Entropy Leakage of Channels in Cascade. In: Barthe, G., Datta, A., Etalle, S. (eds) Formal Aspects of Security and Trust. FAST 2011. Lecture Notes in Computer Science, vol 7140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29420-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-29420-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29419-8
Online ISBN: 978-3-642-29420-4
eBook Packages: Computer ScienceComputer Science (R0)