Non-Uniform Attacks Against Pseudoentropy

نویسندگان

  • Krzysztof Pietrzak
  • Maciej Skorski
چکیده

De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has constant statistical distance to uniform (e.g., the output of a pseudorandom generator mapping n− 1 to n bit strings), can be distinguished from the uniform distribution with advantage by a circuit of size O(2 2). We generalize this result, showing that a distribution which has less than k bits of minentropy, can be distinguished from any distribution with k bits of δ-smooth min-entropy with advantage by a circuit of size O(2 2/δ2). As a special case, this implies that any distribution with support at most 2 (e.g., the output of a pseudoentropy generator mapping k to n bit strings) can be distinguished from any given distribution with min-entropy k+ 1 with advantage by a circuit of size O(2 2). Our result thus shows that pseudoentropy distributions face basically the same non-uniform attacks as pseudorandom distributions. 1998 ACM Subject Classification F.1.3 Complexity Measures and Classes

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Complexity of Breaking Pseudoentropy

Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In this paper we focus on the foundational problem that has not been investigated so far, namely by how much pseudoentropy (the amount seen by computationally bounded attackers) differs from its information-theoretic counterpart (seen by unbounded observers), given certain limits on attacker’s computa...

متن کامل

The Chain Rule for HILL Pseudoentropy, Revisited

Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The most important tools to argue about pseudoentropy are chain rules, which quantify by how much (in terms of quantity and quality) the pseudoentropy of a given random variable X decreases when conditioned on some other v...

متن کامل

Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy

Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect. In this work, we consider the memory leakage model, wher...

متن کامل

Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks

Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...

متن کامل

A New Digital Audio Watermarking Algorithm

In this paper a new digital audio watermarking algorithm is proposed based on B-spline approximation. The algorithm takes the advantage of non-uniform B-spline wavelet, namely, the number of low-frequency components can be arbitrarily selected, so, it is very flexible. Meanwhile, it avoids the complex calculations of non-uniform B-spline wavelets. The simulation experiments show that this algor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017