Skip to main content

2015 | OriginalPaper | Buchkapitel

Information Leakage Due to Revealing Randomly Selected Bits

verfasst von : Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan

Erschienen in: Security Protocols XXIII

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This note describes an information theory problem that arose from some analysis of quantum key distribution protocols. The problem seems very natural and is very easy to state but has not to our knowledge been addressed before in the information theory literature: suppose that we have a random bit string y of length n and we reveal k bits at random positions, preserving the order but without revealing the positions, how much information about y is revealed?
We show that while the cardinality of the set of compatible y strings depends only on n and k, the amount of leakage does depend on the exact revealed x string. We observe that the maximal leakage, measured as decrease in the Shannon entropy of the space of possible bit strings, corresponds to the x string being all zeros or all ones and that the minimum leakage corresponds to the alternating x strings. We derive a formula for the maximum leakage (minimal entropy) in terms of n and k. We discuss the relevance of other measures of information, in particular min-entropy, in a cryptographic context. Finally, we describe a simulation tool to explore these results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ryan, P.Y.A., Christianson, B.: Enhancements to prepare-and-measure based QKD protocols. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 123–133. Springer, Heidelberg (2013) CrossRef Ryan, P.Y.A., Christianson, B.: Enhancements to prepare-and-measure based QKD protocols. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 123–133. Springer, Heidelberg (2013) CrossRef
2.
Zurück zum Zitat Hirschberg, D.S.: Bounds on the number of string subsequences. In: Crochemore, M., Paterson, M. (eds.) CPM 1999. LNCS, vol. 1645, pp. 115–122. Springer, Heidelberg (1999) CrossRef Hirschberg, D.S.: Bounds on the number of string subsequences. In: Crochemore, M., Paterson, M. (eds.) CPM 1999. LNCS, vol. 1645, pp. 115–122. Springer, Heidelberg (1999) CrossRef
3.
Zurück zum Zitat Hirschberg, D.S., Regnier, M.: Tight bounds on the number of string subsequences. J. Discrete Algorithms 1(1), 123–132 (2000)MathSciNet Hirschberg, D.S., Regnier, M.: Tight bounds on the number of string subsequences. J. Discrete Algorithms 1(1), 123–132 (2000)MathSciNet
4.
Zurück zum Zitat Calabi, L., Hartnett, W.: Some general results of coding theory with applications to the study of codes for the correction of synchronization errors. Inf. Control 15(3), 235–249 (1969)MATHMathSciNetCrossRef Calabi, L., Hartnett, W.: Some general results of coding theory with applications to the study of codes for the correction of synchronization errors. Inf. Control 15(3), 235–249 (1969)MATHMathSciNetCrossRef
5.
Zurück zum Zitat Levenshtein, V.I.: Efficient reconstruction of sequences from their subsequences or supersequences. J. Comb. Theory Ser. A 93(2), 310–332 (2001)MATHMathSciNetCrossRef Levenshtein, V.I.: Efficient reconstruction of sequences from their subsequences or supersequences. J. Comb. Theory Ser. A 93(2), 310–332 (2001)MATHMathSciNetCrossRef
7.
Zurück zum Zitat Flaxman, A., Harrow, A.W., Sorkin, G.B.: Strings with maximally many distinct subsequences and substrings. Electron. J. Comb. 11(1), R8 (2004)MathSciNet Flaxman, A., Harrow, A.W., Sorkin, G.B.: Strings with maximally many distinct subsequences and substrings. Electron. J. Comb. 11(1), R8 (2004)MathSciNet
8.
Zurück zum Zitat Flajolet, P., Guivarc’h, Y., Szpankowski, W., Vallée, B.: Hidden pattern statistics. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 152–165. Springer, Heidelberg (2001) CrossRef Flajolet, P., Guivarc’h, Y., Szpankowski, W., Vallée, B.: Hidden pattern statistics. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 152–165. Springer, Heidelberg (2001) CrossRef
9.
Zurück zum Zitat Middendorf, M.: Supersequences, runs, and cd grammar systems. Dev. Theor. Comput. Sci. 6, 101–114 (1994) Middendorf, M.: Supersequences, runs, and cd grammar systems. Dev. Theor. Comput. Sci. 6, 101–114 (1994)
10.
Zurück zum Zitat Lothaire, M.: Applied Combinatorics on Words, vol. 105. Cambridge University Press, Cambridge (2005) MATHCrossRef Lothaire, M.: Applied Combinatorics on Words, vol. 105. Cambridge University Press, Cambridge (2005) MATHCrossRef
11.
Zurück zum Zitat Rahmann, S.: Subsequence combinatorics and applications to microarray production, DNA sequencing and chaining algorithms. In: Lewenstein, M., Valiente, G. (eds.) CPM 2006. LNCS, vol. 4009, pp. 153–164. Springer, Heidelberg (2006) CrossRef Rahmann, S.: Subsequence combinatorics and applications to microarray production, DNA sequencing and chaining algorithms. In: Lewenstein, M., Valiente, G. (eds.) CPM 2006. LNCS, vol. 4009, pp. 153–164. Springer, Heidelberg (2006) CrossRef
12.
13.
Zurück zum Zitat Mitzenmacher, M., et al.: A survey of results for deletion channels and related synchronization channels. Probab. Surv. 6, 1–33 (2009)MATHMathSciNetCrossRef Mitzenmacher, M., et al.: A survey of results for deletion channels and related synchronization channels. Probab. Surv. 6, 1–33 (2009)MATHMathSciNetCrossRef
14.
Zurück zum Zitat Swart, T.G., Ferreira, H.C.: A note on double insertion/deletion correcting codes. IEEE Trans. Inf. Theory 49(1), 269–273 (2003)MATHMathSciNetCrossRef Swart, T.G., Ferreira, H.C.: A note on double insertion/deletion correcting codes. IEEE Trans. Inf. Theory 49(1), 269–273 (2003)MATHMathSciNetCrossRef
15.
Zurück zum Zitat Liron, Y., Langberg, M.: A characterization of the number of subsequences obtained via the deletion channel. In: 2012 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 503–507. IEEE (2012) Liron, Y., Langberg, M.: A characterization of the number of subsequences obtained via the deletion channel. In: 2012 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 503–507. IEEE (2012)
16.
Zurück zum Zitat Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(1), 3–55 (2001)CrossRef Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(1), 3–55 (2001)CrossRef
17.
Zurück zum Zitat Maurer, U., Wolf, S.: Privacy amplification secure against active adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307–321. Springer, Heidelberg (1997) CrossRef Maurer, U., Wolf, S.: Privacy amplification secure against active adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307–321. Springer, Heidelberg (1997) CrossRef
18.
Zurück zum Zitat Renner, R.S., Wolf, S.: Simple and tight bounds for information reconciliation and privacy amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199–216. Springer, Heidelberg (2005) CrossRef Renner, R.S., Wolf, S.: Simple and tight bounds for information reconciliation and privacy amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199–216. Springer, Heidelberg (2005) CrossRef
19.
Zurück zum Zitat Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)MATHCrossRef Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)MATHCrossRef
20.
Zurück zum Zitat Cachin, C.: Entropy measures and unconditional security in cryptography. Ph.D. thesis, Swiss Federal Institute of Technology Zurich (1997) Cachin, C.: Entropy measures and unconditional security in cryptography. Ph.D. thesis, Swiss Federal Institute of Technology Zurich (1997)
21.
Zurück zum Zitat Cachin, C., Maurer, U.M.: Linking information reconciliation and privacy amplification. J. Cryptology 10(2), 97–110 (1997)MATHCrossRef Cachin, C., Maurer, U.M.: Linking information reconciliation and privacy amplification. J. Cryptology 10(2), 97–110 (1997)MATHCrossRef
22.
Zurück zum Zitat Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995)MATHCrossRef Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995)MATHCrossRef
23.
Zurück zum Zitat Renyi, A.: On measures of entropy and information. In: Fourth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 547–561 (1961) Renyi, A.: On measures of entropy and information. In: Fourth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 547–561 (1961)
24.
Zurück zum Zitat MacKay, D.J.: Information theory, inference, and learning algorithms, vol. 7. Citeseer (2003) MacKay, D.J.: Information theory, inference, and learning algorithms, vol. 7. Citeseer (2003)
25.
Zurück zum Zitat Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210–229 (1988)MathSciNetCrossRef Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210–229 (1988)MathSciNetCrossRef
26.
Zurück zum Zitat Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, pp. 106–112. ACM (1977) Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, pp. 106–112. ACM (1977)
27.
Zurück zum Zitat Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (2012) Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (2012)
Metadaten
Titel
Information Leakage Due to Revealing Randomly Selected Bits
verfasst von
Arash Atashpendar
A. W. Roscoe
Peter Y. A. Ryan
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-26096-9_33

Premium Partner