Learning to Impersonate

Abstract

Consider Alice and Bob, who have some shared secret which helps Alice to identify Bob-impersonators, and Eve, who does not know their secret. Eve wants to impersonate Bob and "fool" Alice. If Eve is computationally unbounded, how long does she need to observe Bob before she can impersonate him? What is a good strategy for Eve? If (cryptographic) one-way functions exist, an efficient Eve cannot impersonate even very simple Bobs, but if they do not exist, can Eve learn to impersonate any efficient Bob?We formalize these questions in a new computational learning model, which we believe captures a wide variety of natural learning tasks, and tightly bound the number of observations Eve makes in terms of the secret's entropy. We then show that if one-way functions do not exist, then an efficient Eve can learn to impersonate any efficient Bob nearly as well as an unbounded Eve. For the full version of this work see (Naor & Rothblum, 2006).

Cite

Text

Naor and Rothblum. "Learning to Impersonate." International Conference on Machine Learning, 2006. doi:10.1145/1143844.1143926

Markdown

[Naor and Rothblum. "Learning to Impersonate." International Conference on Machine Learning, 2006.](https://mlanthology.org/icml/2006/naor2006icml-learning/) doi:10.1145/1143844.1143926

BibTeX

@inproceedings{naor2006icml-learning,
  title     = {{Learning to Impersonate}},
  author    = {Naor, Moni and Rothblum, Guy N.},
  booktitle = {International Conference on Machine Learning},
  year      = {2006},
  pages     = {649-656},
  doi       = {10.1145/1143844.1143926},
  url       = {https://mlanthology.org/icml/2006/naor2006icml-learning/}
}