A Convex Analysis Approach to Computational Entropy
نویسنده
چکیده
This paper studies the notion of computational entropy. Using techniques from convex optimization, we investigate the following problems: 1. Can we derandomize the computational entropy? More precisely, for the computational entropy, what is the real difference in security defined using the three important classes of circuits: deterministic boolean, deterministic real valued, or (the most powerful) randomized ones? 2. How large the difference in the computational entropy for an unbounded versus efficient adversary can be? 3. Can we obtain useful, simpler characterizations for the computational entropy? The first question was answered affirmatively for the most important notion of HILL entropy but was open for the metric-type computational entropy, widely used in the leakage-resilent cryptography. In this case, we show that the answer depends on what is the underlying variant of the information-theoretic entropy in the definition of the metric entropy. More precisely, the answer is negative for the commonly used min-entropy based computational entropy. Surprisingly, we show that for all other Renyi entropies the answer is positive security given by unbounded deterministic circuits can be still much worse than that guaranteed by efficient randomized circuits. In the second problem, we obtain some lower-bound type results. Especially, considering conditional computational entropy for two random variables X ∈ {0, 1} and Z ∈ {0, 1}, we show that even if the security parameters are exponential in n+m, the ammount of entropy can be still noticeably higher than that seen by unbounded adversary. Also, for a fixed distribution, decreasing the security parameters by a factor 2 , can result in increasing the entropy by C bits, which agrees with intuition. Studying the third problem, we derive a series of lemmas giving a characterization of the metric entropy for various definitions. As an example of application, we give extremely simple proofs of leakage lemmas, being a central tool in the leakage-resilent cryptography.
منابع مشابه
ON LOCAL HUDETZ g-ENTROPY
In this paper, a local approach to the concept of Hudetz $g$-entropy is presented. The introduced concept is stated in terms of Hudetz $g$-entropy. This representation is based on the concept of $g$-ergodic decomposition which is a result of the Choquet's representation Theorem for compact convex metrizable subsets of locally convex spaces.
متن کاملAdaptive (Analysis of) Algorithms for Convex Hulls and Related Problems
Adaptive analysis is a well known technique in computational geometry, which re nes the traditional worst case analysis over all instances of xed input size by taking into account some other parameters, such as the size of the output in the case of output sensitive analysis. We present two adaptive techniques for the computation of the convex hull in two and three dimensions and related problem...
متن کاملInequalities of Ando's Type for $n$-convex Functions
By utilizing different scalar equalities obtained via Hermite's interpolating polynomial, we will obtain lower and upper bounds for the difference in Ando's inequality and in the Edmundson-Lah-Ribariv c inequality for solidarities that hold for a class of $n$-convex functions. As an application, main results are applied to some operator means and relative operator entropy.
متن کاملA Projected Alternating Least square Approach for Computation of Nonnegative Matrix Factorization
Nonnegative matrix factorization (NMF) is a common method in data mining that have been used in different applications as a dimension reduction, classification or clustering method. Methods in alternating least square (ALS) approach usually used to solve this non-convex minimization problem. At each step of ALS algorithms two convex least square problems should be solved, which causes high com...
متن کاملNumerical and Analytical Approach for Film Condensation on Different Forms of Surfaces
This paper tries to achieve a solution for problems that concern condensation around a flat plate, circular and elliptical tube in by numerical and analytical methods. Also, it calculates entropy production rates. At first, a problem was solved with mesh dynamic and rational assumptions; next it was compared with the numerical solution that the result had acceptable errors. An additional suppor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1305.3288 شماره
صفحات -
تاریخ انتشار 2013