Reference : Information Leakage due to Revealing Randomly Selected Bits
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/21251
Information Leakage due to Revealing Randomly Selected Bits
English
Atashpendar, Arash mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Roscoe, Bill mailto [University of Oxford > Department of Computer Science]
Ryan, Peter mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
25-Nov-2015
Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015
Springer
325-341
Yes
International
Security Protocols XXIII
From 31-03-2015 to 02-04-2015
Cambridge
UK
[en] Information Leakage ; Quantum Key Distribution ; Entropy ; Subsequence ; Supersequence ; Deletion Channel ; Simulation
[en] This note describes an information theory problem that arose from some analysis of quantum key distribution protocols. The problem seems very natural and is very easy to state but has not to our knowledge been addressed before in the information theory literature: suppose that we have a random bit string y of length n and we reveal k bits at random positions, preserving the order but without revealing the positions, how much information about y is revealed?

We show that while the cardinality of the set of compatible y strings depends only on n and k, the amount of leakage does depend on the exact revealed x string. We observe that the maximal leakage, measured as decrease in the Shannon entropy of the space of possible bit strings corresponds to the x string being all zeros or all ones and that the minimum leakage corresponds to the alternating x strings. We derive a formula for the maximum leakage (minimal entropy) in terms of n and k. We discuss the relevance of other measures of information, in particular min-entropy, in a cryptographic context. Finally, we describe a simulation tool to explore these results.
http://hdl.handle.net/10993/21251
10.1007/978-3-319-26096-9_33

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
infoleakage_spw2015_author_preprint.pdfAuthor preprint533.35 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.