2013
DOI: 10.1007/978-3-642-36594-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Overcoming Weak Expectations

Abstract: Abstract. Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about the secret is some non-trivial amount of (min-) entropy. From a formal point of view, such results require to upper bound the expectation of some function f (X), where X is a weak source in question. We show an elementary inequality which essentially upper bounds such 'weak expectation' by two terms, the first of which is independent of f , while the second only depends on th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
57
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 52 publications
(59 citation statements)
references
References 29 publications
2
57
0
Order By: Relevance
“…This is similar in spirit to a lemma of [DY13] which shows that, if we use a key with a small entropy gap for an unpredictability application, the security of the application is only reduced by at most a small amount. One difference that prevents us from using that lemma directly is that we need to explicitly include the seed of the condenser and the dependence between the condenser output and the seed.…”
Section: Definition 2 (Condenser) a Functionsupporting
confidence: 65%
See 1 more Smart Citation
“…This is similar in spirit to a lemma of [DY13] which shows that, if we use a key with a small entropy gap for an unpredictability application, the security of the application is only reduced by at most a small amount. One difference that prevents us from using that lemma directly is that we need to explicitly include the seed of the condenser and the dependence between the condenser output and the seed.…”
Section: Definition 2 (Condenser) a Functionsupporting
confidence: 65%
“…Perhaps, for some such applications, one can argue that the derived key R = h s (X) is still "good enough" for P despite not being statistically close to U m (given s). This approach was recently pioneered by Barak et al [BDK + 11], and then further extended and generalized by Dodis et al [DRV12,DY13]. In these works the authors defined a special class of cryptographic applications, called square-friendly, where the pessimistic RT-bound can be provably improved.…”
Section: Our Main Resultsmentioning
confidence: 99%
“…Analogous observations were made in similar settings [1,5,4], where either the game is two-sided (e.g., indistinguishability applications) or the randomness is sampled from slightly defected min-entropy source. Plugging this lemma into [10] immediately yields a simpler proof for the key lemma of [10] (see Lemma 3.2), namely, "any k th iterate (instantiated with a regular OWF) is hard-to-invert".…”
Section: Introductionmentioning
confidence: 83%
“…4 The Rényi entropy deficiency of a random variable W over set W refers to the difference between entropies of UW and W , i.e., log |W| − H2(W ), where UW denotes the uniform distribution over W and H2(W ) is the Rényi entropy of W . 5 We should not confuse "weakly-regular" with "weakly-one-way", where the former "weakly" describes regularity (i.e., regular on a noticeable fraction as in Definition 2.4) and the latter is used for one-way-ness (i.e., hard-to-invert on a noticeable fraction [19]). …”
Section: Introductionmentioning
confidence: 99%
“…Such wPRFs exist assuming only that one-way functions exist [HILL99,GGM86]. The work of [Pie09] (see also [DY12]) shows that any wPRF is also an ℓ-LR-wPRF for a logarithmic ℓ = O(log(λ)). Constructions of ℓ-LR wPRF for larger ℓ can be derived from prior works on leakage-resilient public-key encryption [NS09], but only under strong public-key assumptions such as DDH.…”
Section: We Define the Advantage Of The Attacker A As Advmentioning
confidence: 99%