Overcoming weak expectations

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about the secret is some non-trivial amount of (min-) entropy. From a formal point of view, such results require to upper bound the expectation of some function f(X), where X is a weak source in question. We show an elementary inequality which essentially upper bounds such 'weak expectation' by two terms, the first of which is independent of f, while the second only depends on the 'variance' of f under uniform distribution. Quite remarkably, as relatively simple corollaries of this elementary inequality, we obtain some 'unexpected' results, in several cases noticeably simplifying/improving prior techniques for the same problem. Examples include non-malleable extractors, leakage-resilient symmetric encryption, alternative to the dense model theorem, seed-dependent condensers and improved entropy loss for the leftover hash lemma.

Original languageEnglish (US)
Title of host publicationTheory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings
Pages1-22
Number of pages22
Volume7785 LNCS
DOIs
StatePublished - 2013
Event10th Theory of Cryptography Conference, TCC 2013 - Tokyo, Japan
Duration: Mar 3 2013Mar 6 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7785 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th Theory of Cryptography Conference, TCC 2013
CountryJapan
CityTokyo
Period3/3/133/6/13

Fingerprint

Entropy
Entropy Loss
Upper bound
Cryptography
Seed
Extractor
Uniform distribution
Leakage
Encryption
Lemma
Corollary
Dependent
Alternatives
Term
Theorem
Model

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Dodis, Y., & Yu, Y. (2013). Overcoming weak expectations. In Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings (Vol. 7785 LNCS, pp. 1-22). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7785 LNCS). https://doi.org/10.1007/978-3-642-36594-2_1

Overcoming weak expectations. / Dodis, Yevgeniy; Yu, Yu.

Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Vol. 7785 LNCS 2013. p. 1-22 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7785 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dodis, Y & Yu, Y 2013, Overcoming weak expectations. in Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. vol. 7785 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7785 LNCS, pp. 1-22, 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, 3/3/13. https://doi.org/10.1007/978-3-642-36594-2_1
Dodis Y, Yu Y. Overcoming weak expectations. In Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Vol. 7785 LNCS. 2013. p. 1-22. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-36594-2_1
Dodis, Yevgeniy ; Yu, Yu. / Overcoming weak expectations. Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Vol. 7785 LNCS 2013. pp. 1-22 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{393402b470f04f7fb9f214e25fb675cc,
title = "Overcoming weak expectations",
abstract = "Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about the secret is some non-trivial amount of (min-) entropy. From a formal point of view, such results require to upper bound the expectation of some function f(X), where X is a weak source in question. We show an elementary inequality which essentially upper bounds such 'weak expectation' by two terms, the first of which is independent of f, while the second only depends on the 'variance' of f under uniform distribution. Quite remarkably, as relatively simple corollaries of this elementary inequality, we obtain some 'unexpected' results, in several cases noticeably simplifying/improving prior techniques for the same problem. Examples include non-malleable extractors, leakage-resilient symmetric encryption, alternative to the dense model theorem, seed-dependent condensers and improved entropy loss for the leftover hash lemma.",
author = "Yevgeniy Dodis and Yu Yu",
year = "2013",
doi = "10.1007/978-3-642-36594-2_1",
language = "English (US)",
isbn = "9783642365935",
volume = "7785 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "1--22",
booktitle = "Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings",

}

TY - GEN

T1 - Overcoming weak expectations

AU - Dodis, Yevgeniy

AU - Yu, Yu

PY - 2013

Y1 - 2013

N2 - Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about the secret is some non-trivial amount of (min-) entropy. From a formal point of view, such results require to upper bound the expectation of some function f(X), where X is a weak source in question. We show an elementary inequality which essentially upper bounds such 'weak expectation' by two terms, the first of which is independent of f, while the second only depends on the 'variance' of f under uniform distribution. Quite remarkably, as relatively simple corollaries of this elementary inequality, we obtain some 'unexpected' results, in several cases noticeably simplifying/improving prior techniques for the same problem. Examples include non-malleable extractors, leakage-resilient symmetric encryption, alternative to the dense model theorem, seed-dependent condensers and improved entropy loss for the leftover hash lemma.

AB - Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about the secret is some non-trivial amount of (min-) entropy. From a formal point of view, such results require to upper bound the expectation of some function f(X), where X is a weak source in question. We show an elementary inequality which essentially upper bounds such 'weak expectation' by two terms, the first of which is independent of f, while the second only depends on the 'variance' of f under uniform distribution. Quite remarkably, as relatively simple corollaries of this elementary inequality, we obtain some 'unexpected' results, in several cases noticeably simplifying/improving prior techniques for the same problem. Examples include non-malleable extractors, leakage-resilient symmetric encryption, alternative to the dense model theorem, seed-dependent condensers and improved entropy loss for the leftover hash lemma.

UR - http://www.scopus.com/inward/record.url?scp=84873970779&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84873970779&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-36594-2_1

DO - 10.1007/978-3-642-36594-2_1

M3 - Conference contribution

AN - SCOPUS:84873970779

SN - 9783642365935

VL - 7785 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1

EP - 22

BT - Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings

ER -