2014
DOI: 10.1007/978-3-319-04268-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Modulus Computational Entropy

Abstract: The so-called leakage-chain rule is a very important tool used in many security proofs. It gives an upper bound on the entropy loss of a random variable X in case the adversary who having already learned some random variables Z1, . . . , Z ℓ correlated with X, obtains some further information Z ℓ+1 about X. Analogously to the information-theoretic case, one might expect that also for the computational variants of entropy the loss depends only on the actual leakage, i.e. on Z ℓ+1 . Surprisingly, Krenn et al. ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Leakage Chain Rule for quantum HILL pseudoentropy. The classical Leakage Chain Rule for rHILL pseudoentropy, first proved by [DP08,RTTV08] and improved by [FR12,Sko13], states that for a joint distribution (X, Z, B) where B consists of ℓ = O(log κ) bits,…”
Section: Leakage Chain Rulementioning
confidence: 99%
“…Leakage Chain Rule for quantum HILL pseudoentropy. The classical Leakage Chain Rule for rHILL pseudoentropy, first proved by [DP08,RTTV08] and improved by [FR12,Sko13], states that for a joint distribution (X, Z, B) where B consists of ℓ = O(log κ) bits,…”
Section: Leakage Chain Rulementioning
confidence: 99%
“…One of the primary uses of HILL entropy is that applying a randomness extractor [NZ93] yields pseudorandom bits [BSW03, Lemma 4.2]. There are many notions of indistinguishability based pseudoentropy [BSW03,Sko14]. One significant drawback of conditional HILL entropy is that revealing one bit can significantly decrease HILL entropy [KPW13].…”
Section: Pseudoentropymentioning
confidence: 99%
“…A counterexample to the chain rule using ideas from deniable encryption was recently shown by Krenn et al [42]. Skorski [57] provides a general characterization of when the chain rule applies.…”
Section: Work On Conditional Computational Entropymentioning
confidence: 99%