Non-Uniform Attacks Against Pseudoentropy
نویسندگان
چکیده
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has constant statistical distance to uniform (e.g., the output of a pseudorandom generator mapping n− 1 to n bit strings), can be distinguished from the uniform distribution with advantage by a circuit of size O(2 2). We generalize this result, showing that a distribution which has less than k bits of minentropy, can be distinguished from any distribution with k bits of δ-smooth min-entropy with advantage by a circuit of size O(2 2/δ2). As a special case, this implies that any distribution with support at most 2 (e.g., the output of a pseudoentropy generator mapping k to n bit strings) can be distinguished from any given distribution with min-entropy k+ 1 with advantage by a circuit of size O(2 2). Our result thus shows that pseudoentropy distributions face basically the same non-uniform attacks as pseudorandom distributions. 1998 ACM Subject Classification F.1.3 Complexity Measures and Classes
منابع مشابه
On the Complexity of Breaking Pseudoentropy
Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In this paper we focus on the foundational problem that has not been investigated so far, namely by how much pseudoentropy (the amount seen by computationally bounded attackers) differs from its information-theoretic counterpart (seen by unbounded observers), given certain limits on attacker’s computa...
متن کاملThe Chain Rule for HILL Pseudoentropy, Revisited
Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The most important tools to argue about pseudoentropy are chain rules, which quantify by how much (in terms of quantity and quality) the pseudoentropy of a given random variable X decreases when conditioned on some other v...
متن کاملUnifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect. In this work, we consider the memory leakage model, wher...
متن کاملIncreasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks
Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...
متن کاملA New Digital Audio Watermarking Algorithm
In this paper a new digital audio watermarking algorithm is proposed based on B-spline approximation. The algorithm takes the advantage of non-uniform B-spline wavelet, namely, the number of low-frequency components can be arbitrarily selected, so, it is very flexible. Meanwhile, it avoids the complex calculations of non-uniform B-spline wavelets. The simulation experiments show that this algor...
متن کامل