skip to main content
10.1145/1143844.1143926acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlConference Proceedingsconference-collections
Article

Learning to impersonate

Published:25 June 2006Publication History

ABSTRACT

Consider Alice and Bob, who have some shared secret which helps Alice to identify Bob-impersonators, and Eve, who does not know their secret. Eve wants to impersonate Bob and "fool" Alice. If Eve is computationally unbounded, how long does she need to observe Bob before she can impersonate him? What is a good strategy for Eve? If (cryptographic) one-way functions exist, an efficient Eve cannot impersonate even very simple Bobs, but if they do not exist, can Eve learn to impersonate any efficient Bob?We formalize these questions in a new computational learning model, which we believe captures a wide variety of natural learning tasks, and tightly bound the number of observations Eve makes in terms of the secret's entropy. We then show that if one-way functions do not exist, then an efficient Eve can learn to impersonate any efficient Bob nearly as well as an unbounded Eve.For the full version of this work see (Naor & Rothblum, 2006).

References

  1. Abe, N., & Warmuth, M. K. (1992) On the Computational Complexity of Approximating Distributions by Probabilistic Automata. Machine Learning 9: 205--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Applebaum, B., Ishai, Y., & Kushilevitz, E. (2004) Cryptography in NCO. FOCS 2004: 166--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baum, L. E. (1972) An inequality and associated maximization technique in statistical estimation of probabilistic functions of a Markov process. Inequalities 627(3): 1--8.Google ScholarGoogle Scholar
  4. Baum, L. E., Petrie, T., Soules, G., & Weiss, N. (1970) A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Annals of Mathematical Statistics 41: 164--171.Google ScholarGoogle ScholarCross RefCross Ref
  5. Gillman, D., & Sipser, M. (1994) Inference and Minimization of Hidden Markov Chains. COLT 1994: 147--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Goldreich, O. (1990). A Note on Computational In-distinguishability. Information Processing Letters 34(6): 277--281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Goldreich, O. (2001) Foundations of Cryptography. Cambridge University Press. Google ScholarGoogle ScholarCross RefCross Ref
  8. Håstad, J., Impagliazzo, R., Levin, L. A., & Luby, M. (1999) A Pseudorandom Generator from any One-way Function. SIAM Journal on Computing 28(4): 1364--1396. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Helmbold, D. P. & Long, P. M. (1994) Tracking Drifting Concepts By Minimizing Disagreements. Machine Learning 14(1): 27--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Impagliazzo, R. (1995) A Personal View of Average-Case Complexity. Structure in Complexity Theory Conference 1995: 134--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Impagliazzo, R., & Levin, L. A. (1990) No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random. FOCS 1990: 812--821.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Impagliazzo, R., & Luby, M. (1989) One-way Functions are Essential for Complexity Based Cryptography. FOCS 1989: 230--235.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kearns, M. J., Mansour, Y., Ron, D., Rubinfeld, R., Schapire, R. E., & Sellie, L. (1994) "On the learnability of discrete distributions". STOC 1994: 273--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kearns, M. J., & Schapire, R. E. (1994) Efficient Distribution-Free Learning of Probabilistic Concepts. Journal of Computer and System Sciences 48(3): 464--497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kearns, M. J., & Vazirani, U. V. (1994) An Introduction to Computational Learning Theory. MIT Press. Google ScholarGoogle ScholarCross RefCross Ref
  16. Maurer, U. M. (2000) Authentication theory and hypothesis testing. IEEE Transactions on Information Theory 46(4): 1350--1356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Naor, M., & Rothblum, G. N. (2005) The Complexity of Online Memory Checking. FOCS 2005: 573--584. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Naor, M., & Rothblum, G. N. (2006) Learning to Impersonate. Full version available at: www.wisdom.weizmann.ac.il/~naor/PAPERS/acd_abs.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Rabiner, L. R. (1989) "A tutorial on hidden Markov models and selected applications in speech recognition". Proceedings of the IEEE 77 (2): 257--286.Google ScholarGoogle ScholarCross RefCross Ref
  20. Ron, D., Singer, Y., & Tishby, N. (1996) The Power of Amnesia: Learning Probabilistic Automata with Variable Memory Length. Machine Learning 25(2-3): 117--149 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Shannon, C. E. (1949) Communication Theory of Secrecy Systems. Bell System Technical Journal 28: 656--715.Google ScholarGoogle ScholarCross RefCross Ref
  22. Simmons, G. J. (1984). Authentication Theory/Coding Theory. CRYPTO 1984: 411--431. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Valiant, L. G. (1984) A Theory of the Learnable. Communications of the ACM 27(11): 1134--1142. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Learning to impersonate

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  ICML '06: Proceedings of the 23rd international conference on Machine learning
                  June 2006
                  1154 pages
                  ISBN:1595933832
                  DOI:10.1145/1143844

                  Copyright © 2006 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 25 June 2006

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  ICML '06 Paper Acceptance Rate140of548submissions,26%Overall Acceptance Rate140of548submissions,26%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader