Inaccessible entropy

STOC(2009)

引用 62|浏览38
暂无评分
摘要
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Speciflcally, we say that the ith round of a protocol (A;B) has accessible entropy at most k, if no polynomial-time strategy A ⁄ can generate messages for A such that the entropy of its message in the ith round has entropy greater than k when conditioned both on prior messages of the protocol and on prior coin tosses of A ⁄ . We say that the protocol has inaccessible entropy if the total accessible entropy (summed over the rounds) is noticeably smaller than the real entropy of A's messages, conditioned only on prior messages (but not the coin tosses of A). As applications of this notion, we † Give a much simpler and more e-cient construction of statistically hiding commitment schemes from arbitrary one-way functions. † Prove that constant-round statistically hiding commitments are necessary for constructing constant-round zero-knowledge proof systems for NP that remain secure under parallel composition (assuming the existence of one-way functions).
更多
查看译文
关键词
interactive hash-,high entropy string,commitment schemes,arbitrary one-way function,cryptography,prior coin toss,real entropy,total accessible entropy,prior message,th round,accessible entropy,coin toss,computational complexity,inaccessible entropy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要