Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing 2009
DOI: 10.1145/1536414.1536497
|View full text |Cite
|
Sign up to set email alerts
|

Inaccessible entropy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
72
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 34 publications
(73 citation statements)
references
References 24 publications
1
72
0
Order By: Relevance
“…This holds even if both parties are guaranteed to follow the protocol except for making additional queries to tokens in order to learn information about the other party's input. The proof of this negative result employs a variant of the recent notion of accessible entropy from [38] and has the following high level intuition: In the standard model without tokens, one way to explain why statistical OT is not possible is to consider the randomness r R of the receiver conditioned on the transcript τ of the protocol. If this conditional distribution reveals information about the receiver's choice b, then an unbounded sender can cheat by sampling from this distribution.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This holds even if both parties are guaranteed to follow the protocol except for making additional queries to tokens in order to learn information about the other party's input. The proof of this negative result employs a variant of the recent notion of accessible entropy from [38] and has the following high level intuition: In the standard model without tokens, one way to explain why statistical OT is not possible is to consider the randomness r R of the receiver conditioned on the transcript τ of the protocol. If this conditional distribution reveals information about the receiver's choice b, then an unbounded sender can cheat by sampling from this distribution.…”
Section: Introductionmentioning
confidence: 99%
“…If an OT protocol did have accessible entropy, then essentially the above impossibility argument would apply. (In contrast, the original definition of accessible entropy of [38] required that the parties could efficiently sample, since the focus in that work was on analyzing protocols secure against computationally bounded parties. )…”
Section: Introductionmentioning
confidence: 99%
“…The notion of next-block pseudoentropy generators was inspired by the notion of inaccessible entropy generators in [13]. These are generators G that also produce m blocks (x 1 , .…”
Section: Relation To Inaccessible Entropymentioning
confidence: 99%
“…The key to our construction is a new notion of next-block pseudoentropy, which is inspired by the recently introduced notion of "inaccessible entropy" [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation