Maximal α-Leakage and its Properties

Maximal α-leakage is a tunable measure of information leakage based on the quality of an adversary’s belief about an arbitrary function of private data based on public data. The parameter α determines the loss function used to measure the quality of a belief, ranging from log-loss at $\alpha=1$ to the probability of error at $\alpha=\infty$. We review its definition and main properties, including extensions to $\alpha\lt 1$, robustness to side information, and relationship to Rènyi differential privacy.

[1]  Sudeep Kamath,et al.  An operational measure of information leakage , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[2]  Sergio Verdú,et al.  Upper bounds on the relative entropy and Rényi divergence as a function of total variation distance for finite alphabets , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).

[3]  Ilya Mironov,et al.  Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).

[4]  Flávio du Pin Calmon,et al.  Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  Neri Merhav,et al.  Universal Prediction , 1998, IEEE Trans. Inf. Theory.

[6]  Oliver Kosut,et al.  Robustness of Maximal α-Leakage to Side Information , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[7]  Richard D. Wesel,et al.  Multiterminal source coding with an entropy-based distortion measure , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[8]  Oliver Kosut,et al.  A Tunable Measure for Information Leakage , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[9]  H. Vincent Poor,et al.  Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Martin J. Wainwright,et al.  Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  R. Sibson Information radius , 1969 .

[13]  Sudeep Kamath,et al.  An Operational Approach to Information Leakage , 2018, IEEE Transactions on Information Theory.

[14]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[15]  Oliver Kosut,et al.  Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs , 2018, IEEE Transactions on Information Theory.

[16]  Muriel Médard,et al.  On information-theoretic metrics for symmetric-key encryption and privacy , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Oliver Kosut,et al.  Privacy Under Hard Distortion Constraints , 2018, 2018 IEEE Information Theory Workshop (ITW).

[18]  Peter E. Latham,et al.  Mutual Information , 2006 .

[19]  G. Crooks On Measures of Entropy and Information , 2015 .