Pointwise maximal leakage

S Saeidian, G Cervia, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …

Additive and multiplicative notions of leakage, and their capacities

MS Alvim, K Chatzikokolakis, A McIver… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …

Recent developments in quantitative information flow (invited tutorial)

G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …

A novel analysis of utility in privacy pipelines, using kronecker products and quantitative information flow

MS Alvim, N Fernandes, A McIver, C Morgan… - Proceedings of the …, 2023 - dl.acm.org
We combine Kronecker products, and quantitative information flow, to give a novel formal
analysis for the fine-grained verification of utility in complex privacy pipelines. The …

Universal optimality and robust utility bounds for metric differential privacy 1

N Fernandes, A McIver… - Journal of Computer …, 2023 - content.iospress.com
We study the privacy-utility trade-off in the context of metric differential privacy. Ghosh et al.
introduced the idea of universal optimality to characterise the “best” mechanism for a certain …

Axioms for information leakage

MS Alvim, K Chatzikokolakis, A McIver… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Quantitative information flow aims to assess and control the leakage of sensitive information
by computer systems. A key insight in this area is that no single leakage measure is …

Quantifying information leakage of deterministic encryption

M Jurado, G Smith - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
In order to protect user data while maintaining application functionality, encrypted databases
can use specialized cryptography such as property-revealing encryption, which allows a …

Comparing systems: Max-case refinement orders and application to differential privacy

K Chatzikokolakis, N Fernandes… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Quantitative Information Flow (QIF) and Differential Privacy (DP) are both concerned with the
protection of sensitive information, but they are rather different approaches. In particular, QIF …

Information leakage games

MS Alvim, K Chatzikokolakis, Y Kawamoto… - Decision and Game …, 2017 - Springer
We consider a game-theoretic setting to model the interplay between attacker and defender
in the context of information flow, and to reason about their optimal strategies. In contrast …

Conditional entropy and data processing: An axiomatic approach based on core-concavity

A Américo, MHR Khouzani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This work presents an axiomatization for entropy based on an extension of concavity called
core-concavity. We show that core-concavity characterizes the largest class of functions for …