Gambling, computational information and encryption security

Mohammad Hajiabadi, Bruce M. Kapron

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    We revisit the question, originally posed by Yao (1982), of whether encryption security may be characterized using computational information. Yao provided an affirmative answer, using a compression based notion of computational information to give a characterization equivalent to the standard computational notion of semantic security. We give two other equivalent characterizations. The first uses a computational formulation of Kelly’s (1957) model for “gambling with inside information”, leading to an encryption notion which is similar to Yao’s but where encrypted data is used by an adversary to place bets maximizing the rate of growth of total wealth over a sequence of independent, identically distributed events. The difficulty of this gambling task is closely related to Vadhan and Zheng’s (2011) notion of KL-hardness, which in certain cases is equivalent to a conditional form of the pseudoentropy introduced by Hastad et. al. (1999). Using techniques introduced to prove this equivalence, we are also able to give a characterization of encryption security in terms of conditional pseudoentropy. Finally, we will reconsider the gambling model with respect to “risk-neutral” adversaries in an attempt to understand whether assumptions about the rationality of adversaries may impact the level of security achieved by an encryption scheme.

    Original languageEnglish (US)
    Title of host publicationInformation Theoretic Security - 8th International Conference, ICITS 2015, Proceedings
    EditorsStefan Wolf, Anja Lehmann
    PublisherSpringer Verlag
    Pages141-158
    Number of pages18
    ISBN (Print)9783319174693
    DOIs
    StatePublished - 2015
    Event8th International Conference on Information Theoretic Security, ICITS 2015 - Lugano, Switzerland
    Duration: May 2 2015May 5 2015

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume9063
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference8th International Conference on Information Theoretic Security, ICITS 2015
    CountrySwitzerland
    CityLugano
    Period5/2/155/5/15

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Computer Science(all)

    Fingerprint Dive into the research topics of 'Gambling, computational information and encryption security'. Together they form a unique fingerprint.

    Cite this