Given a channel with input X, we have now seen that g-leakage provides us with a rich variety of ways to measure the information leakage of X that the channel causes. The prior models the adversary’s prior knowledge about X; the gain function g models the operational scenario, which encompasses both the set of actions that the adversary can take and also the worth to the adversary of each such action, for each possible value of X; and the choice of multiplicative- or additive leakage allows us to measure either the relative or the absolute increase in g-vulnerability.
CITATION STYLE
Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., & Smith, G. (2020). Robustness. In Information Security and Cryptography (pp. 101–105). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-96131-6_6
Mendeley helps you to discover research relevant for your work.