Knowledge Transfer and Information Leakage in Protocols

被引:0
|
作者
Khadir, Abdullah Abdul
Mukund, Madhavan [1 ]
Suresh, S. P.
机构
[1] Chennai Math Inst, Chennai, Tamil Nadu, India
关键词
FLOW;
D O I
10.1007/978-3-319-68167-2_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A protocol defines a structured conversation aimed at exchanging information between two or more parties. Complete confidentiality is virtually impossible so long as useful information needs to be transmitted. A more useful approach is to quantify the amount of information that is leaked. Traditionally, information flow in protocols has been analyzed using notions of entropy. We move to a discrete approach where information is measured in terms of propositional facts. We consider protocols involving agents holding numbered cards who exchange information to discover each others' private hands. We define a transition system that searches the space of all possible announcement sequences made by such a set of agents and tries to identify a subset of announcements that constitutes an informative yet safe protocol.
引用
收藏
页码:225 / 240
页数:16
相关论文
共 50 条
  • [1] Information Leakage in Arbiter Protocols
    Tsiskaridze, Nestan
    Bang, Lucas
    McMahan, Joseph
    Bultan, Tevfik
    Sherwood, Timothy
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2018), 2018, 11138 : 404 - 421
  • [2] Quantifying information leakage of randomized protocols
    Biondi, Fabrizio
    Legay, Axel
    Malacaria, Pasquale
    Wasowski, Andrzej
    THEORETICAL COMPUTER SCIENCE, 2015, 597 : 62 - 87
  • [3] Quantifying Information Leakage of Randomized Protocols
    Biondi, Fabrizio
    Legay, Axel
    Malacaria, Pasquale
    Wasowski, Andrzej
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION (VMCAI 2013), 2013, 7737 : 68 - 87
  • [4] INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
    Rass, Stefan
    Schartner, Peter
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 134 - 143
  • [5] A New Information Leakage Measure for Anonymity Protocols
    Zhioua, Sami
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 398 - 414
  • [6] Two quantum dialogue protocols without information leakage
    Gao, Gan
    OPTICS COMMUNICATIONS, 2010, 283 (10) : 2288 - 2293
  • [7] Information and Knowledge Leakage in Supply Chain
    Kim Hua Tan
    W. P. Wong
    Leanne Chung
    Information Systems Frontiers, 2016, 18 : 621 - 638
  • [8] Information and Knowledge Leakage in Supply Chain
    Tan, Kim Hua
    Wong, W. P.
    Chung, Leanne
    INFORMATION SYSTEMS FRONTIERS, 2016, 18 (03) : 621 - 638
  • [9] Information leakage in the football transfer market
    Furesz, Diana Ivett
    Rappai, Gabor
    EUROPEAN SPORT MANAGEMENT QUARTERLY, 2022, 22 (03) : 419 - 439
  • [10] Transfer Entropy Quantifies Information Leakage
    Jungwirth, Patrick
    Hahs, Daniel W.
    2019 IEEE SOUTHEASTCON, 2019,