An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

No free lunch theorem for security and utility in federated learning

X Zhang, H Gu, L Fan, K Chen, Q Yang - ACM Transactions on Intelligent …, 2022 - dl.acm.org
In a federated learning scenario where multiple parties jointly learn a model from their
respective data, there exist two conflicting goals for the choice of appropriate algorithms. On …

An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Context-aware generative adversarial privacy

C Huang, P Kairouz, X Chen, L Sankar, R Rajagopal - Entropy, 2017 - mdpi.com
Preserving the utility of published datasets while simultaneously providing provable privacy
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …

Optimal utility-privacy trade-off with total variation distance as a privacy measure

B Rassouli, D Gündüz - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The total variation distance is proposed as a privacy measure in an information disclosure
scenario when the goal is to reveal some information about available data in return of utility …

Pointwise maximal leakage

S Saeidian, G Cervia, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …

Bounding the invertibility of privacy-preserving instance encoding using fisher information

K Maeng, C Guo, S Kariyappa… - Advances in Neural …, 2023 - proceedings.neurips.cc
Privacy-preserving instance encoding aims to encode raw data into feature vectors without
revealing their privacy-sensitive information. When designed properly, these encodings can …

Efficient anonymous batch authentication scheme with conditional privacy in the Internet of Vehicles (IoV) applications

C Maurya, VK Chaurasiya - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) has emerged as a robust solution to improve real-time road
traffic conditions, safety, and driving comfort. However, the road's dynamic environment and …

On the robustness of information-theoretic privacy measures and mechanisms

M Diaz, H Wang, FP Calmon… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Consider a data publishing setting for a dataset composed by both private and non-private
features. The publisher uses an empirical distribution, estimated from n iid samples, to …

Data disclosure with non-zero leakage and non-invertible leakage matrix

A Zamani, TJ Oechtering… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We study a statistical signal processing privacy problem, where an agent observes useful
data and wants to reveal the information to a user. Since the useful data is correlated with …