Information Theoretic Security
Volume 9063 of the series Lecture Notes in Computer Science pp 141-158
Gambling, Computational Information and Encryption Security
- Mohammad HajiabadiAffiliated withDepartment of Computer Science, University of Victoria Email author
- , Bruce M. KapronAffiliated withDepartment of Computer Science, University of Victoria
Abstract
We revisit the question, originally posed by Yao (1982), of whether encryption security may be characterized using computational information. Yao provided an affirmative answer, using a compression-based notion of computational information to give a characterization equivalent to the standard computational notion of semantic security. We give two other equivalent characterizations. The first uses a computational formulation of Kelly’s (1957) model for “gambling with inside information”, leading to an encryption notion which is similar to Yao’s but where encrypted data is used by an adversary to place bets maximizing the rate of growth of total wealth over a sequence of independent, identically distributed events. The difficulty of this gambling task is closely related to Vadhan and Zheng’s (2011) notion of KL-hardness, which in certain cases is equivalent to a conditional form of the pseudoentropy introduced by Hastad et. al. (1999). Using techniques introduced to prove this equivalence, we are also able to give a characterization of encryption security in terms of conditional pseudoentropy. Finally, we will reconsider the gambling model with respect to “risk-neutral” adversaries in an attempt to understand whether assumptions about the rationality of adversaries may impact the level of security achieved by an encryption scheme.
Keywords
Kelly criterion KL-hardness computational entropy semantic security rational adversaries- Title
- Gambling, Computational Information and Encryption Security
- Book Title
- Information Theoretic Security
- Book Subtitle
- 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
- Pages
- pp 141-158
- Copyright
- 2015
- DOI
- 10.1007/978-3-319-17470-9_9
- Print ISBN
- 978-3-319-17469-3
- Online ISBN
- 978-3-319-17470-9
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 9063
- Series ISSN
- 0302-9743
- Publisher
- Springer International Publishing
- Copyright Holder
- Springer International Publishing Switzerland
- Additional Links
- Topics
- Keywords
-
- Kelly criterion
- KL-hardness
- computational entropy
- semantic security
- rational adversaries
- Industry Sectors
- eBook Packages
- Editors
-
-
Anja Lehmann
(13)
-
Stefan Wolf
(14)
-
Anja Lehmann
- Editor Affiliations
-
- 13. IBM Research Zurich
- 14. Università della Svizzera italiana (USI)
- Authors
-
-
Mohammad Hajiabadi
(15)
-
Bruce M. Kapron
(15)
-
Mohammad Hajiabadi
- Author Affiliations
-
- 15. Department of Computer Science, University of Victoria, Victoria, BC, Canada, V8W 3P6
Continue reading...
To view the rest of this content please follow the download PDF link above.