【24h】

On the Complexity of Breaking Pseudoentropy

机译:论伪伪的复杂性

获取原文

摘要

Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In this paper we focus on the foundational problem that has not been investigated so far, namely by how much pseudoentropy (the amount seen by computationally bounded attackers) differs from its information-theoretic counterpart (seen by unbounded observers), given certain limits on attacker's computational power? We provide the following answer for HILL pseudoentropy, which exhibits a threshold behavior around the size exponential in the entropy amount: - If the attacker size (s) and advantage (e) satisfy s 2~k∈~(-2) where k is the claimed amount of pseudoentropy, then the pseudoentropy boils down to the information-theoretic smooth entropy. - If s 2~k∈~2 then pseudoentropy could be arbitrarily bigger than the information-theoretic smooth entropy. Besides answering the posted question, we show an elegant application of our result to the complexity theory, namely that it implies the classical result on the existence of functions hard to approximate (due to Pippenger). In our approach we utilize non-constructive techniques: the duality of linear programming and the probabilistic method.
机译:伪关节已经发现了许多重要应用于加密和复杂性理论。在本文中,我们专注于到目前为止尚未调查的基础问题,即由其信息理论对应物(由无限的观察者看到的信息)不同的伪影(计算有界攻击者)的不同之处,给予攻击者的某些限制计算能力?我们为Hill PseudoEntopy提供以下答案,它在熵数量中展示了围绕尺寸指数的阈值行为: - 如果攻击者大小和优势(e)满足s 2〜k∈〜(-2) k是索赔量的伪影,然后伪影孔归结为信息理论的平滑熵。 - 如果s 2〜k∈〜2则伪复制可能是任意大于信息理论的平滑熵。除了回答发布的问题外,我们对我们的结果显示了我们对复杂性理论的优雅应用,即它意味着古典结果对难以近似的函数(由于Pippenger)。在我们的方法中,我们利用非建设性技术:线性规划的二元性和概率方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号