Gambling, Computational Information and Encryption Security

We revisit the question, originally posed by Yao (1982), of whether encryption security may be characterized using computational information. Yao provided an affirmative answer, using a compression-based notion of computational information to give a characterization equivalent to the standard computational notion of semantic security. We give two other equivalent characterizations. The first uses a computational formulation of Kelly’s (1957) model for “gambling with inside information”, leading to an encryption notion which is similar to Yao’s but where encrypted data is used by an adversary to place bets maximizing the rate of growth of total wealth over a sequence of independent, identically distributed events. The difficulty of this gambling task is closely related to Vadhan and Zheng’s (2011) notion of KL-hardness, which in certain cases is equivalent to a conditional form of the pseudoentropy introduced by Hastad et. al. (1999). Using techniques introduced to prove this equivalence, we are also able to give a characterization of encryption security in terms of conditional pseudoentropy. Finally, we will reconsider the gambling model with respect to “risk-neutral” adversaries in an attempt to understand whether assumptions about the rationality of adversaries may impact the level of security achieved by an encryption scheme.

[1]  Silvio Micali,et al.  The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.

[2]  Oded Goldreich,et al.  Foundations of Cryptography: List of Figures , 2001 .

[3]  Alexander Vardy,et al.  Semantic Security for the Wiretap Channel , 2012, CRYPTO.

[4]  Gábor Lugosi,et al.  Prediction, learning, and games , 2006 .

[5]  Avi Wigderson,et al.  Computational Analogues of Entropy , 2003, RANDOM-APPROX.

[6]  Chi-Jen Lu,et al.  Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility , 2007, EUROCRYPT.

[7]  Y. Freund,et al.  Adaptive game playing using multiplicative weights , 1999 .

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  D. Bernoulli Exposition of a New Theory on the Measurement of Risk , 1954 .

[10]  Alexandre Pinto,et al.  Comparing Notions of Computational Entropy , 2007, Theory of Computing Systems.

[11]  Ueli Maurer,et al.  Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[12]  Andrew Chi-Chih Yao,et al.  Computational information theory , 1988 .

[13]  Maciej Skorski Metric Pseudoentropy: Characterizations, Transformations and Applications , 2015, ICITS.

[14]  John L. Kelly,et al.  A new interpretation of information rate , 1956, IRE Trans. Inf. Theory.

[15]  Salil P. Vadhan,et al.  Characterizing pseudoentropy and simplifying pseudorandom generator constructions , 2012, STOC '12.

[16]  Leonid Reyzin,et al.  Some Notions of Entropy for Cryptography - (Invited Talk) , 2011, ICITS.

[17]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[18]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[19]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[20]  Anja Lehmann,et al.  Information theoretic security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings , 2015 .

[21]  Charles R. Skinner Now , 1927 .

[22]  Thomas M. Cover,et al.  Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .

[23]  Stephan Krenn,et al.  A counterexample to the chain rule for conditional HILL entropy , 2013, computational complexity.

[24]  Yevgeniy Dodis,et al.  Shannon Impossibility, Revisited , 2012, ICITS.

[25]  Stephan Krenn,et al.  A counterexample to the chain rule for conditional HILL entropy , 2016, computational complexity.

[26]  Hoeteck Wee On pseudoentropy versus compressibility , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..

[27]  Andrew Chi-Chih Yao,et al.  Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.

[28]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 1: Basic Techniques , 2001 .

[29]  Oded Goldreich Foundations of Cryptography: Index , 2001 .