A Generalized Constraint of Privacy: <inline-formula> <tex-math notation="LaTeX">$\alpha$ </tex-math></inline-formula>-Mutual Information Security

We study the security of a variety of cryptographic tasks including traditional privacy (e.g., seeded extractors, encryptions, commitments, and secret sharing schemes) and differential privacy from the perspective of &#x03B1;-mutual information. As far as we know, encryption scheme, commitment,...

Full description

Bibliographic Details
Main Author: Yanqing Yao
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8672471/
Description
Summary:We study the security of a variety of cryptographic tasks including traditional privacy (e.g., seeded extractors, encryptions, commitments, and secret sharing schemes) and differential privacy from the perspective of &#x03B1;-mutual information. As far as we know, encryption scheme, commitment, and differential privacy have been studied via mutual information based on the Shannon entropy. Though Bellare et al. in CRYPTO 2012 have got some results about encryption schemes, the upper bound of mutual information is not the tightest. Though Cuff and Yu in CCS 2016 mentioned the direction of the Re&#x0301;nyi entropy generalization, only a few results about differential privacy were obtained, and even for Shannon entropy, the proof in that paper has some limitations. In this paper, we propose a modular and unified framework to study the relations between statistical security and mutual information security for a series of privacy schemes other than prior work that focused on a special scheme. In addition, we introduce &#x03B1;-mutual information security via the Re&#x0301;nyi entropy for a series of privacy schemes and aim to bridge the gap between statistical security and &#x03B1;-mutual information security. By resorting to an improved upper bound on the difference between the Shannon entropy of two distributions, the convexity of a function, useful equality about statistical distance, and the absolutely homogeneous property of &#x03B1;-norm, we obtain rigorous proofs of their essential equivalence. An extra fruit is that the relations between mutual information security and statistical security of encryption and commitment schemes are improved. Hence, two fundamentally different ways of defining privacy security are connected.
ISSN:2169-3536