Simulating Auxiliary Inputs, Revisited
نویسنده
چکیده
For any pair (X,Z) of correlated random variables we can think of Z as a randomized function of X. Provided that Z is short, one can make this function computationally efficient by allowing it to be only approximately correct. In folklore this problem is known as simulating auxiliary inputs. This idea of simulating auxiliary information turns out to be a powerful tool in computer science, finding applications in complexity theory, cryptography, pseudorandomness and zero-knowledge. In this paper we revisit this problem, achieving the following results: (a) We discuss and compare efficiency of known results, finding the flaw in the best known bound claimed in the TCC’14 paper ”How to Fake Auxiliary Inputs”. (b) We present a novel boosting algorithm for constructing the simulator. Our technique essentially fixes the flaw. This boosting proof is of independent interest, as it shows how to handle ”negative mass” issues when constructing probability measures in descent algorithms. (c) Our bounds are much better than bounds known so far. To make the simulator (s, ǫ)-indistinguishable we need the complexityO ( s · 2ǫ ) in time/circuit size, which is better by a factor ǫ compared to previous bounds. In particular, with our technique we (finally) get meaningful provable security for the EUROCRYPT’09 leakage-resilient stream cipher instantiated with a standard 256-bit block cipher, like AES256. Our boosting technique utilizes a two-step approach. In the first step we shift the current result (as in gradient or sub-gradient descent algorithms) and in the separate step we fix the biggest non-negative mass constraint violation (if applicable).
منابع مشابه
Collaboration Engineering Framework for Manufacturing System
Manufacturing system can be regarded as collaboration between principal and auxiliary tasks. Principal task shows activities of manufacturing, assemblage and setup operation, etc. Auxiliary task indicates activities of picking, transportation and replacement operation, etc. Auxiliary task caused by setup operation occurs frequently in manufacturing system. Lowering the efficiency of auxiliary t...
متن کاملModeling and modal analysis to oscillations of IPMC cantilever beam and simulating as an actuator
The purpose of this article is modal analysis of ionic polymer metal composite beams, then briefing the system to the unique parameters to help in up modeling of the actuator. In this paper at first using of Mathematical analysis and Closed form transfer function of cantilever beam dynamic response to the forces of different inputs (intensive and continuous) is calculated and for different type...
متن کاملEncryption Schemes with Post-Challenge Auxiliary Inputs
In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both the secret key owner and the encryptor, in the auxiliary input model. Existing models usually do not allow adversaries to query more leakage information after seeing the challenge ciphertext of the security games. On one hand, side-channel attacks on the random factor ...
متن کاملIntegration of artificial neural network and geographic information system applications in simulating groundwater quality
Background: Although experiments on water quality are time consuming and expensive, models are often employed as supplement to simulate water quality. Artificial neural network (ANN) is an efficient tool in hydrologic studies, yet it cannot predetermine its results in the forms of maps and geo-referenced data. Methods: In this study, ANN was applied to simulate groundwater quality ...
متن کاملHoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited
We define NanoJava, a kernel of Java tailored to the investigation of Hoare logics. We then introduce a Hoare logic for this language featuring an elegant approach for expressing auxiliary variables: by universal quantification on the outer logical level. Furthermore, we give simple means of handling side-effecting expressions and dynamic binding within method calls. The logic is proved sound a...
متن کامل