Krenn , Stephan and Pietrzak, Krzysztof and Wadia, Akshay and Wichs, Daniel
(2016)
*A counterexample to the chain rule for conditional HILL entropy.*
Computational Complexity, 25 (3).
pp. 567-505.
ISSN 1420-8954

Text
678.pdf - Submitted Version Available under License Creative Commons Attribution. [IST-2017-766-v1+1] Download (471Kb) |

## Abstract

Most entropy notions H(.) like Shannon or min-entropy satisfy a chain rule stating that for random variables X,Z, and A we have H(X|Z,A)≥H(X|Z)−|A|. That is, by conditioning on A the entropy of X can decrease by at most the bitlength |A| of A. Such chain rules are known to hold for some computational entropy notions like Yao’s and unpredictability-entropy. For HILL entropy, the computational analogue of min-entropy, the chain rule is of special interest and has found many applications, including leakage-resilient cryptography, deterministic encryption, and memory delegation. These applications rely on restricted special cases of the chain rule. Whether the chain rule for conditional HILL entropy holds in general was an open problem for which we give a strong negative answer: we construct joint distributions (X,Z,A), where A is a distribution over a single bit, such that the HILL entropy H HILL (X|Z) is large but H HILL (X|Z,A) is basically zero. Our counterexample just makes the minimal assumption that NP⊈P/poly. Under the stronger assumption that injective one-way function exist, we can make all the distributions efficiently samplable. Finally, we show that some more sophisticated cryptographic objects like lossy functions can be used to sample a distribution constituting a counterexample to the chain rule making only a single invocation to the underlying object.

Item Type: | Article |
---|---|

DOI: | 10.1007/s00037-015-0120-9 |

Uncontrolled Keywords: | Computational entropy; HILL entropy; Chain rule; Lossy functions |

Subjects: | 000 Computer science, knowledge & general works > 000 Computer science, knowledge & systems > 004 Data processing & computer science |

Research Group: | Pietrzak Group |

Depositing User: | Sword Import User |

Date Deposited: | 22 Feb 2017 15:02 |

Last Modified: | 05 Sep 2017 09:16 |

URI: | https://repository.ist.ac.at/id/eprint/766 |

### Actions (login required)

View Item |