Anonymity protocols as noisy channels

From MaRDI portal
Publication:2482451

DOI10.1016/j.ic.2007.07.003zbMath1147.68394OpenAlexW2056277260MaRDI QIDQ2482451

Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden

Publication date: 16 April 2008

Published in: Information and Computation (Search for Journal in Brave)

Full work available at URL: https://hal.inria.fr/inria-00349225/file/full.pdf




Related Items (29)

Quantifying leakage in the presence of unreliable sources of informationProbabilistic and nondeterministic aspects of anonymityAutomation of Quantitative Information-Flow AnalysisMin-entropy as a resourceThermodynamic aspects of confidentialityHybrid statistical estimation of mutual information and its application to information flowAn axiomatization of information flow measuresSearching secrets rationallyUnnamed ItemSqueeziness: an information theoretic measure for avoiding fault maskingCompositional methods for information-hidingMaximizing entropy over Markov processesQuantifying Vulnerability of Secret Generation Using Hyper-DistributionsAnalyzing anonymity attacks through noisy channelsConditional anonymity with non-probabilistic adversaryInformation Theory and Security: Quantitative Information FlowGeneralized Differential Privacy: Regions of Priors That Admit Robust Optimal MechanismsQuantification of integrityA semiring-based trace semantics for processes with applications to information leakage analysisAsymptotic information leakage under one-try attacksQuantifying opacityAlgebraic foundations for quantitative information flowInformation hiding in probabilistic concurrent systemsOn the Foundations of Quantitative Information FlowQuantitative Notions of Leakage for One-try AttacksWorst- and average-case privacy breaches in randomization mechanismsQuantifying information leakage of randomized protocolsQuantitative Information Flow and Applications to Differential PrivacyQuantifying information leakage in process calculi


Uses Software


Cites Work




This page was built for publication: Anonymity protocols as noisy channels