Statistical Inference, Zero Knowledge and Proofs of Identity
Abstract
The aim of the present article is to show how computational complexity can interfere with statistical inference in such a way that pieces of information that are completely equivalent from the point of view of information theory become very different computationally. In order to clarify this paradox, we will first describe concepts and techniques that have appeared these last years: asymptotic evaluation of computation time, probabilistic algorithms, one-way functions, zero knowledge proofs etc. Doing so, we will understand how these concepts allow creation and protection of secrecy by tools which are derived from precise mathematical problems that are publicly discussed. This is precisely the viewpoint of modern cryptography.
Keywords
Probabilistic Algorithm Random String Decimal Digit Abstract Machine Polynomial Time Probabilistic AlgorithmPreview
Unable to display preview. Download preview PDF.
References
- [1]Blum, L., Blum, M. and Shub, M.: 1983, ‘A simple secure pseudo-random generator’, in Advances in Cryptology, Crypto 82 (Chaum, D., Rivest, R.L. and Sherman, A.T. eds), Plenum Press: New-York, 61–78Google Scholar
- [2]Fiat, A. and Shamir, A.: 1986, ‘How to prove yourself: practical solutions to identification and signature problems’, in Advances in Cryptology, Crypto 86, Lect. Notes in Comp. Sci. 263, Springer Berlag: Berlin, 186–94Google Scholar
- [3]Goldwasser, S., Micali, S. and Rackoff, C: 1985, ‘The knowledge complexity of interactive proof systems’, in Proc. 17th ACM Symp. Theory of Computing, 291–304Google Scholar
- [4]Hastad, J., Impagliazzo, R., Levin, L. and Luby, M.: 1989, ‘Pseudo-random number generation from one-way functions’, in Proc. 21st ACM Symp. Theory of Computing, 12–24Google Scholar
- [5]Lenstra, A.K. and Manasse, M.: 1989, ‘Factoring by electronic mail’, in Advances in cryptology, Eurocrypt 89, Lect. Notes in Comp. Sci., 355–371Google Scholar
- [6]Rabin, M.O.: 1980, ‘Probabilistic algorithms for testing primality’, J. Numb. Theory 12, 128–138MathSciNetMATHCrossRefGoogle Scholar
- [7]Rivest, R., Shamir, A. and Adleman, L.: 1978, ‘A method for obtaining digital signatures and publc key cryptosystems’, Comm. ACM 21, 120–126MathSciNetMATHCrossRefGoogle Scholar
- [8]Shamir, A.: 1990, ‘IP = PSPACE’, in Proc. of the 31st IEEE Symp. on Foundations of Comp. Sci., 11–15Google Scholar
- [9]Solovay, R. and Strassen, V.: 1977, ‘A fast Monte-Carlo test for primality’, SIAM J. Comput. 6, 84–85MathSciNetMATHCrossRefGoogle Scholar
- [10]Stern, J.: 1987, ‘Secret linear congruential generators are not cryptographically secure’, in Proc. of the 28th IEEE Symp. on Foundations of Comp. Sci., 421–26Google Scholar
- [11]Stern, J.: 1990, Fondements Mathématiques de l’Informatique, Mac Graw Hill: ParisGoogle Scholar
- [12]Turing, A.M.: 1936, ‘On computable numbers, with an application to the Entscheidungsproblem’, Proc. London Math. Soc 2–42, 230–265 (Correction, ibid 2–43, 544–546)MathSciNetGoogle Scholar
- [13]Yao, A.C.: 1982, ‘Theory and applications of trapdoor functions’, in Proc. of the 23rd IEEE Symp. on Foundations of Comp. Sci., 80–91Google Scholar