A Counterexample to the Chain Rule for Conditional HILL Entropy

And What Deniable Encryption Has to Do with It
  • Stephan Krenn
  • Krzysztof Pietrzak
  • Akshay Wadia
Conference paper

DOI: 10.1007/978-3-642-36594-2_2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7785)
Cite this paper as:
Krenn S., Pietrzak K., Wadia A. (2013) A Counterexample to the Chain Rule for Conditional HILL Entropy. In: Sahai A. (eds) Theory of Cryptography. Lecture Notes in Computer Science, vol 7785. Springer, Berlin, Heidelberg

Abstract

A chain rule for an entropy notion H(·) states that the entropy H(X) of a variable X decreases by at most ℓ if conditioned on an ℓ-bit string A, i.e., H(X|A) ≥ H(X) − ℓ. More generally, it satisfies a chain rule for conditional entropy if H(X|Y,A) ≥ H(X|Y) − ℓ.

All natural information theoretic entropy notions we are aware of (like Shannon or min-entropy) satisfy some kind of chain rule for conditional entropy. Moreover, many computational entropy notions (like Yao entropy, unpredictability entropy and several variants of HILL entropy) satisfy the chain rule for conditional entropy, though here not only the quantity decreases by ℓ, but also the quality of the entropy decreases exponentially in ℓ. However, for the standard notion of conditional HILL entropy (the computational equivalent of min-entropy) the existence of such a rule was unknown so far.

In this paper, we prove that for conditional HILL entropy no meaningful chain rule exists, assuming the existence of one-way permutations: there exist distributions X,Y,A, where A is a distribution over a single bit, but HHILL(X|Y)≫ HHILL(X|Y,A), even if we simultaneously allow for a massive degradation in the quality of the entropy.

The idea underlying our construction is based on a surprising connection between the chain rule for HILL entropy and deniable encryption.

Keywords

Computational entropy HILL entropy Conditional chain rule 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© International Association for Cryptologic Research 2013

Authors and Affiliations

  • Stephan Krenn
    • 1
  • Krzysztof Pietrzak
    • 2
  • Akshay Wadia
    • 3
  1. 1.IBM Research - ZurichRüschlikonSwitzerland
  2. 2.Institute of Science and Technology AustriaAustria
  3. 3.University of CaliforniaLos AngelesUSA

Personalised recommendations