Information Theoretical Cryptogenography
We consider problems where \(n\) people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion, and show that the amount of leaked information will always be bounded by the expected inc...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2014-02 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Jakobsen, Sune K |
description | We consider problems where \(n\) people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion, and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. We ask the question: Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most \(c\) to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is \(- \frac{\log(1-c)}{c} -\log(e)\) bits. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2083813037</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2083813037</sourcerecordid><originalsourceid>FETCH-proquest_journals_20838130373</originalsourceid><addsrcrecordid>eNpjYuA0MjY21LUwMTLiYOAtLs4yMDAwMjM3MjU15mTQ8MxLyy_KTSzJzM9TCMlIzS9KLclMTsxRcC6qLCjJT0_Ny08vSizIqORhYE1LzClO5YXS3AzKbq4hzh66BUX5haWpxSXxWfmlRXlAqXgjAwtjC0NjA2NzY-JUAQD9fTDi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2083813037</pqid></control><display><type>article</type><title>Information Theoretical Cryptogenography</title><source>Free E- Journals</source><creator>Jakobsen, Sune K</creator><creatorcontrib>Jakobsen, Sune K</creatorcontrib><description>We consider problems where \(n\) people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion, and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. We ask the question: Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most \(c\) to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is \(- \frac{\log(1-c)}{c} -\log(e)\) bits.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Communication</subject><ispartof>arXiv.org, 2014-02</ispartof><rights>2014. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780</link.rule.ids></links><search><creatorcontrib>Jakobsen, Sune K</creatorcontrib><title>Information Theoretical Cryptogenography</title><title>arXiv.org</title><description>We consider problems where \(n\) people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion, and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. We ask the question: Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most \(c\) to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is \(- \frac{\log(1-c)}{c} -\log(e)\) bits.</description><subject>Communication</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpjYuA0MjY21LUwMTLiYOAtLs4yMDAwMjM3MjU15mTQ8MxLyy_KTSzJzM9TCMlIzS9KLclMTsxRcC6qLCjJT0_Ny08vSizIqORhYE1LzClO5YXS3AzKbq4hzh66BUX5haWpxSXxWfmlRXlAqXgjAwtjC0NjA2NzY-JUAQD9fTDi</recordid><startdate>20140213</startdate><enddate>20140213</enddate><creator>Jakobsen, Sune K</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20140213</creationdate><title>Information Theoretical Cryptogenography</title><author>Jakobsen, Sune K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20838130373</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Jakobsen, Sune K</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jakobsen, Sune K</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Information Theoretical Cryptogenography</atitle><jtitle>arXiv.org</jtitle><date>2014-02-13</date><risdate>2014</risdate><eissn>2331-8422</eissn><abstract>We consider problems where \(n\) people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion, and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. We ask the question: Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most \(c\) to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is \(- \frac{\log(1-c)}{c} -\log(e)\) bits.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2014-02 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2083813037 |
source | Free E- Journals |
subjects | Communication |
title | Information Theoretical Cryptogenography |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A59%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Information%20Theoretical%20Cryptogenography&rft.jtitle=arXiv.org&rft.au=Jakobsen,%20Sune%20K&rft.date=2014-02-13&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2083813037%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2083813037&rft_id=info:pmid/&rfr_iscdi=true |