【24h】

On the Complexity of Breaking Pseudoentropy

机译:关于打破伪熵的复杂性

获取原文

摘要

Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In this paper we focus on the foundational problem that has not been investigated so far, namely by how much pseudoentropy (the amount seen by computationally bounded attackers) differs from its information-theoretic counterpart (seen by unbounded observers), given certain limits on attacker's computational power? We provide the following answer for HILL pseudoentropy, which exhibits a threshold behavior around the size exponential in the entropy amount: - If the attacker size (s) and advantage (e) satisfy s 2~k∈~(-2) where k is the claimed amount of pseudoentropy, then the pseudoentropy boils down to the information-theoretic smooth entropy. - If s 2~k∈~2 then pseudoentropy could be arbitrarily bigger than the information-theoretic smooth entropy. Besides answering the posted question, we show an elegant application of our result to the complexity theory, namely that it implies the classical result on the existence of functions hard to approximate (due to Pippenger). In our approach we utilize non-constructive techniques: the duality of linear programming and the probabilistic method.
机译:伪熵已经在密码学和复杂性理论中发现了许多重要的应用。在本文中,我们关注的是到目前为止尚未研究的基本问题,即在给定攻击者的特定限制的情况下,伪熵(计算受限的攻击者看到的数量)与信息理论对应的数量(由无限制的观察者看到的)相差多少。计算能力?对于HILL伪熵,我们提供以下答案,该伪熵在熵值的大小指数周围表现出阈值行为:-如果攻击者的大小(s)和优势(e)满足s >> 2〜k∈〜(-2), k是要求的伪熵量,然后伪熵归结为信息理论的光滑熵。 -如果s << 2〜k∈〜2,则伪熵可以比信息理论的光滑熵任意大。除了回答已发布的问题外,我们还将结果很好地应用于复杂性理论,即它暗示了存在难以逼近的函数(归因于Pippenger)的经典结果。在我们的方法中,我们利用了非构造性技术:线性规划和概率方法的对偶性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号