In Quantitative Information Flow, refinement (Open image in new window) expresses the strong property that one channel never leaks more than another. Since two channels are then typically incomparable, here we explore a family of refinement quasimetrics offering greater flexibility. We show these quasimetrics let us unify refinement and capacity, we show that some of them can be computed efficiently via linear programming, and we establish upper bounds via the Earth Mover’s distance. We illustrate our techniques on the Crowds protocol.
This is a preview of subscription content, log in to check access.
Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: Additive and multiplicative notions of leakage, and their capacities. In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), pp. 308–322 (2014)Google Scholar
Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: The Science of Quantitative Information Flow. Springer, Heidelberg (2019)zbMATHGoogle Scholar
Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: Proceedings of 25th IEEE Computer Security Foundations Symposium (CSF 2012), pp. 265–279, June 2012Google Scholar
Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electr. Notes Theor. Comput. Sci. 59(3), 238–251 (2001). (Proceedings of Workshop on Quantitative Aspects of Programming Languages)CrossRefGoogle Scholar
Clarkson, M., Myers, A., Schneider, F.: Belief in information flow. In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW 2005), pp. 31–45 (2005)Google Scholar
Espinoza, B., Smith, G.: Min-entropy as a resource. Inf. Comput. 226, 57–75 (2013). (Special Issue on Information Security as a Resource)MathSciNetCrossRefGoogle Scholar
Köpf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 286–296 (2007)Google Scholar