Computational information theory

What is information? In a fundamental sense, Shannon’s definition of entropy captures the notion of information in situations where unlimited computing power is always available. As a result, in applications such as cryptography, where computational cost plays a central role, the classical information theory does not provide a totally satisfactory framework. In recent years, after Diffie and Hellman proposed the use of trapdoor function as the cornerstone for a new genre of cryptography, this deficiency is particularly dramatized; a ciphertext contains all the Shannon information about the plaintext, yet this information is ‘inaccessible’, i.e., it cannot be efficiently computed. This begs the challenging question ‘what is accessible information?’ Can we combine two very successful theories, namely, Information Theory and Computational Complexity Theory, to capture the notion of accessible information? In this chapter, we will give an exposition of a new information theory along this line and examine its applications in cryptography.

[1]  守屋 悦朗,et al.  J.E.Hopcroft, J.D. Ullman 著, "Introduction to Automata Theory, Languages, and Computation", Addison-Wesley, A5変形版, X+418, \6,670, 1979 , 1980 .

[2]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[5]  John Gill,et al.  Computational Complexity of Probabilistic Turing Machines , 1977, SIAM J. Comput..

[6]  F. MacWilliams,et al.  Pseudo-random sequences and arrays , 1976, Proceedings of the IEEE.

[7]  Silvio Micali,et al.  The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.

[8]  Manuel Blum,et al.  Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.

[9]  Gilles Brassard Relativized Cryptography , 1979, FOCS.

[10]  Andrew Chi-Chih Yao,et al.  Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.