Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: ESORICS 2010
Guest editors: Dimitris GritzalisGuest Editor
Article type: Research Article
Authors: Yasuoka, Hirotoshia; * | Terauchi, Tachiob
Affiliations: [a] Tohoku University, Sendai, Japan. E-mail: yasuoka@kb.ecei.tohoku.ac.jp | [b] Nagoya University, Nagoya, Japan. E-mail: terauchi@is.nagoya-u.ac.jp
Correspondence: [*] Corresponding author: Hirotoshi Yasuoka, Graduate School of Information Sciences, Tohoku University, Aramaki aza Aoba 6-3-09, Aoba-ku, Sendai, Miyagi, 980-8579, Japan. Tel.: +81 22 795 4063; E-mail: yasuoka@kb.ecei.tohoku.ac.jp.
Abstract: Researchers have proposed formal definitions of quantitative information flow based on information theoretic notions such as the Shannon entropy, the min entropy, the guessing entropy, belief, and channel capacity. This paper investigates the hardness of precisely checking the quantitative information flow of a program according to such definitions. More precisely, we study the “bounding problem” of quantitative information flow, defined as follows: Given a program M and a positive real number q, decide if the quantitative information flow of M is less than or equal to q. We prove that the bounding problem is not a k-safety property for any k (even when q is fixed, for the Shannon-entropy-based definition with the uniform distribution), and therefore is not amenable to the self-composition technique that has been successfully applied to checking non-interference. We also prove complexity theoretic hardness results for the case when the program is restricted to loop-free Boolean programs. Specifically, we show that the problem is PP-hard for all definitions, showing a gap with non-interference which is coNP-complete for the same class of programs. The paper also compares the results with the recently proved results on the comparison problems of quantitative information flow.
Keywords: Security, quantitative information flow, program verification
DOI: 10.3233/JCS-2011-0437
Journal: Journal of Computer Security, vol. 19, no. 6, pp. 1029-1082, 2011
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl