10 46 5 v 2 [ cs . C R ] 3 0 M ar 2 01 8 Leakage and Protocol Composition in a Game-Theoretic Perspective ⋆