TY - JOUR
T1 - A Generalized Constraint of Privacy
T2 - α -Mutual Information Security
AU - Yao, Yanqing
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2019
Y1 - 2019
N2 - We study the security of a variety of cryptographic tasks including traditional privacy (e.g., seeded extractors, encryptions, commitments, and secret sharing schemes) and differential privacy from the perspective of α -mutual information. As far as we know, encryption scheme, commitment, and differential privacy have been studied via mutual information based on the Shannon entropy. Though Bellare et al. in CRYPTO 2012 have got some results about encryption schemes, the upper bound of mutual information is not the tightest. Though Cuff and Yu in CCS 2016 mentioned the direction of the Rényi entropy generalization, only a few results about differential privacy were obtained, and even for Shannon entropy, the proof in that paper has some limitations. In this paper, we propose a modular and unified framework to study the relations between statistical security and mutual information security for a series of privacy schemes other than prior work that focused on a special scheme. In addition, we introduce α -mutual information security via the Rényi entropy for a series of privacy schemes and aim to bridge the gap between statistical security and α -mutual information security. By resorting to an improved upper bound on the difference between the Shannon entropy of two distributions, the convexity of a function, useful equality about statistical distance, and the absolutely homogeneous property of α -norm, we obtain rigorous proofs of their essential equivalence. An extra fruit is that the relations between mutual information security and statistical security of encryption and commitment schemes are improved. Hence, two fundamentally different ways of defining privacy security are connected.
AB - We study the security of a variety of cryptographic tasks including traditional privacy (e.g., seeded extractors, encryptions, commitments, and secret sharing schemes) and differential privacy from the perspective of α -mutual information. As far as we know, encryption scheme, commitment, and differential privacy have been studied via mutual information based on the Shannon entropy. Though Bellare et al. in CRYPTO 2012 have got some results about encryption schemes, the upper bound of mutual information is not the tightest. Though Cuff and Yu in CCS 2016 mentioned the direction of the Rényi entropy generalization, only a few results about differential privacy were obtained, and even for Shannon entropy, the proof in that paper has some limitations. In this paper, we propose a modular and unified framework to study the relations between statistical security and mutual information security for a series of privacy schemes other than prior work that focused on a special scheme. In addition, we introduce α -mutual information security via the Rényi entropy for a series of privacy schemes and aim to bridge the gap between statistical security and α -mutual information security. By resorting to an improved upper bound on the difference between the Shannon entropy of two distributions, the convexity of a function, useful equality about statistical distance, and the absolutely homogeneous property of α -norm, we obtain rigorous proofs of their essential equivalence. An extra fruit is that the relations between mutual information security and statistical security of encryption and commitment schemes are improved. Hence, two fundamentally different ways of defining privacy security are connected.
KW - Differential privacy
KW - Rényi entropy
KW - mutual information
KW - statistical security
KW - traditional privacy schemes
UR - https://www.scopus.com/pages/publications/85063965456
U2 - 10.1109/ACCESS.2019.2905278
DO - 10.1109/ACCESS.2019.2905278
M3 - 文章
AN - SCOPUS:85063965456
SN - 2169-3536
VL - 7
SP - 36122
EP - 36131
JO - IEEE Access
JF - IEEE Access
M1 - 8672471
ER -