Unifying Computational Entropies via Kullback–Leibler Divergence | SpringerLink
Skip to main content

Unifying Computational Entropies via Kullback–Leibler Divergence

  • Conference paper
  • First Online:
Advances in Cryptology – CRYPTO 2019 (CRYPTO 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11693))

Included in the following conference series:

Abstract

We introduce hardness in relative entropy, a new notion of hardness for search problems which on the one hand is satisfied by all one-way functions and on the other hand implies both next-block pseudoentropy and inaccessible entropy, two forms of computational entropy used in recent constructions of pseudorandom generators and statistically hiding commitment schemes, respectively. Thus, hardness in relative entropy unifies the latter two notions of computational entropy and sheds light on the apparent “duality” between them. Additionally, it yields a more modular and illuminating proof that one-way functions imply next-block inaccessible entropy, similar in structure to the proof that one-way functions imply next-block pseudoentropy (Vadhan and Zheng, STOC ‘12).

R. Agrawal—Supported by the Department of Defense (DoD) through the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

Y.-H. Chen—Supported by NSF grant CCF-1763299.

T. Horel—Supported in part by the National Science Foundation under grants CAREER IIS-1149662, CNS-1237235 and CCF-1763299, by the Office of Naval Research under grants YIP N00014-14-1-0485 and N00014-17-1-2131, and by a Google Research Award.

S. Vadhan—Supported by NSF grant CCF-1763299.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 16015
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 20019
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Recall that for random variables A and B with \({{\,\mathrm{Supp}\,}}(A)\subseteq {{\,\mathrm{Supp}\,}}(B)\), the relative entropy is defined by .

  2. 2.

    Relative entropy is also commonly referred to as Kullback–Liebler divergence, which explains the standard \({{\,\mathrm{KL}\,}}\) notation. We prefer to use relative entropy to have more uniformity across the notions discussed in this work.

  3. 3.

    We used the unconventional notation y for the instance (instead of x) because our relations will often be of the form \(\varPi ^f\) for some function f; in this case an instance is some y in the range of f and a witness for y is any preimage \(x\in f^{-1}(y)\).

  4. 4.

    For the theorems in this paper that relate two notions of hardness, the notation \(t'=\varOmega (t)\) means that there exists a constant C depending only on the computational model such that \(t'\ge C\cdot t\).

  5. 5.

    As already mentioned in the introduction, this notion was in fact called “\({{\,\mathrm{KL}\,}}\)-hardness for sampling” in [21] but we rename it here to unify the terminology between the various notions discussed here.

  6. 6.

    We write \(m+1\) the total number of blocks, since in this section we will think of \(Y_{m+1}\) (also written as W) as the witness of distributional search problem and \((Y_1,\dots ,Y_m)\) are the blocks of the instance as in the previous section.

  7. 7.

    For example, the distribution \((Y_{\le m}, Y_{m+1}) = (f(U), U)\) for a function f and uniform input U is always a flat distribution even if f itself is not regular.

References

  1. Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo random bits. In: Proceedings of the 23th Annual Symposium on Foundations of Computer Science (FOCS), pp. 112–117 (1982)

    Google Scholar 

  2. Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37(2), 156–189 (1988)

    Article  MathSciNet  Google Scholar 

  3. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  4. Ding, Y.Z., Harnik, D., Rosen, A., Shaltiel, R.: Constant-round oblivious transfer in the bounded storage model. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 446–472. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24638-1_25

    Chapter  Google Scholar 

  5. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)

    Article  MathSciNet  Google Scholar 

  6. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC), pp. 218–229. ACM Press (1987)

    Google Scholar 

  7. Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(1), 691–729 (1991)

    MathSciNet  MATH  Google Scholar 

  8. Haitner, I., Holenstein, T., Reingold, O., Vadhan, S.P., Wee, H.: Universal one-way hash functions via inaccessible entropy. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 616–637. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_31

    Chapter  Google Scholar 

  9. Haitner, I., Nguyen, M., Ong, S.J., Reingold, O., Vadhan, S.: Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. SIAM J. Comput. 39(3), 1153–1218 (2009)

    Article  MathSciNet  Google Scholar 

  10. Haitner, I., Reingold, O., Vadhan, S.: Efficiency improvements in constructing pseudorandom generators from one-way functions. In: Proceedings of the 42nd Annual ACM Symposium on Theory of Computing (STOC), pp. 437–446 (2010)

    Google Scholar 

  11. Haitner, I., Reingold, O., Vadhan, S., Wee, H.: Inaccessible entropy. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC 2009), pp. 611–620, 31 May–2 June 2009

    Google Scholar 

  12. Haitner, I., Reingold, O., Vadhan, S.P.: Eciency improvements in constructing pseudorandom generators from one-way functions. SIAM J. Comput. 42(3), 1405–1430 (2013). https://doi.org/10.1137/100814421

    Article  MathSciNet  MATH  Google Scholar 

  13. Haitner, I., Reingold, O., Vadhan, S.P., Wee, H.: Inaccessible entropy I: inaccessible entropy generators and statistically hiding commitments from one-way functions (2016). www.cs.tau.ac.il/~iftachh/papers/AccessibleEntropy/IE1.pdf. To appear. Preliminary version, named Inaccessible Entropy, appeared in STOC 2009

  14. Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364–1396 (1999)

    Article  MathSciNet  Google Scholar 

  15. Impagliazzo, R., Luby, M.: One-way functions are essential for complexity based cryptography. In: Proceedings of the 30th Annual Symposium on Foundations of Computer Science (FOCS), pp. 230–235 (1989)

    Google Scholar 

  16. Naor, M.: Bit commitment using pseudorandomness. J. Cryptol. 4(2), 151–158 (1991)

    Article  Google Scholar 

  17. Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect zero-knowledge arguments for NP using any one-way permutation. J. Cryptol. 11(2), 87–108 (1998). Preliminary version in CRYPTO 1992

    Article  MathSciNet  Google Scholar 

  18. Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC), pp. 33–43. ACM Press (1989)

    Google Scholar 

  19. Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)

    Article  MathSciNet  Google Scholar 

  20. Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (STOC), pp. 387–394 (1990)

    Google Scholar 

  21. Vadhan, S.P., Zheng, C.J.: Characterizing pseudoentropy and simplifying pseudorandom generator constructions. In: Proceedings of the 44th Symposium on Theory of Computing Conference, STOC 2012, pp. 817–836 (2012). http://doi.acm.org/10.1145/2213977.2214051

  22. Yao, A.C.: Theory and applications of trapdoor functions. In: Proceedings of the 23th Annual Symposium on Foundations of Computer Science (FOCS), pp. 80–91 (1982)

    Google Scholar 

Download references

Acknowledgements

We thank Muthuramakrishnan Venkitasubramaniam for an inspiring conversation which sparked this work.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Rohit Agrawal , Yi-Hsiu Chen or Thibaut Horel .

Editor information

Editors and Affiliations

A Missing Proofs

A Missing Proofs

Lemma A.1

For all \(t \ge 1\), \(f:x\mapsto \frac{x}{1-(1-x)^t}\) is convex over [0, 1].

Proof

We instead show convexity of \(\tilde{f}:x\mapsto f(1-x)\). A straightforward computation gives:

$$\begin{aligned} \tilde{f}''(x) = \frac{x^{t-2}t\big (t(1-x)(x^t+1) - (1+x)(1-x^t)\big )}{(1-x^t)^3} \end{aligned}$$

so that it suffices to show the non-negativity of \(g(x) = t(1-x)(x^t+1) - (1+x)(1-x^t)\) over [0, 1]. The function g has second derivative \(t(1-x)(t^2-1)x^{t-2}\), which is non-negative when \(x\in [0, 1]\), and thus the first derivative \(g'\) is non-decreasing. Also, the first derivative at 1 is equal to zero, so that \(g'\) is non-positive over [0, 1] and hence g is non-increasing over this interval. Since \(g(1) = 0\), this implies that g is non-negative over [0, 1] and f is convex as desired.

Theorem A.2

(Theorem 3.11 restated). Let \(\varPi \) be a binary relation and let (YW) be pair of random variables supported on \(\varPi \). If \((\varPi , Y)\) is \((t, \varepsilon )\)-hard, then \((\varPi , Y, W)\) is \((t', \varDelta ')\) witness hard in relative entropy and \((t', \varDelta '')\) witness hard in \(\delta \)-min relative entropy for every \(\delta \in [0,1]\) where \(t' = \varOmega (t)\), \(\varDelta ' = \log (1/\varepsilon )\) and \(\varDelta '' = \log (\delta /\varepsilon )\).

Proof

We proceed similarly to the proof of Theorem 3.5. Let be a pair of algorithms with \(\mathsf {\widetilde{G}}= (\mathsf {\widetilde{G}}_1, \mathsf {\widetilde{G}}_\mathsf {w})\) a two-block generator supported on \(\varPi \). Define the linear-time oracle algorithm . Then

figure d

The witness hardness in relative entropy then follows by applying Jensen’s inequality (since \(2^{-x}\) is convex) and the witness hardness in \(\delta \)-min relative entropy follows by Markov’s inequality by considering the event that the sample relative entropy is smaller than \(\varDelta \) (this event has density at least \(\delta \)).

Rights and permissions

Reprints and permissions

Copyright information

© 2019 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agrawal, R., Chen, YH., Horel, T., Vadhan, S. (2019). Unifying Computational Entropies via Kullback–Leibler Divergence. In: Boldyreva, A., Micciancio, D. (eds) Advances in Cryptology – CRYPTO 2019. CRYPTO 2019. Lecture Notes in Computer Science(), vol 11693. Springer, Cham. https://doi.org/10.1007/978-3-030-26951-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26951-7_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26950-0

  • Online ISBN: 978-3-030-26951-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics