Exercise 2.9 - Conditional independence

Answers

For question (a), the antecedent ( X W | Z , Y ) means that x σ ( X ) , w σ ( W ) and v σ ( Y , Z ) we have

Pr ( x w | v ) = Pr ( x | v ) Pr ( w | v ) .

The antecedent ( X Y | Z ) can be translated to that x σ ( X ) , y σ ( Y ) and z σ ( Z ) ,

Pr ( x y | z ) = Pr ( x | z ) Pr ( y | z ) .

What we desire to obtain is x σ ( X ) , w σ ( W ) and z σ ( Z ) ,

Pr ( x w | z ) = Pr ( x | z ) Pr ( w | z ) .

This is correct by having v in the first equation taking values in σ ( Z ) solely. Since σ ( Z ) σ ( Y , Z ) .

For question (b), we have the premises: x σ ( X ) , y σ ( Y ) , z σ ( Z ) and w σ ( W ) :

Pr ( x y | z ) = Pr ( x | z ) Pr ( y | z ) .

Pr ( x y | w ) = Pr ( x | w ) Pr ( y | w ) .

The desired result if v σ ( Z , W ) ,

Pr ( x y | v ) = Pr ( x | v ) Pr ( y | v ) .

Let x and y be two disjoint events, z and w be another pair of disjoints, and none of x z , x w , y z , y w is empty w.r.t. the underlying probability measure. Finally, let v = w z . One can then check that the equation above does not hold for this setting, hence the deduction in (b) is false.

(b) is intuitively false. A straightforward example is a cryptography example: group signature with three participants. The group signature is a protocol for encryption/verification that ensures a series of security requirements including:

  • Anyone participant solely cannot pass the verification.
  • Two participants can pass the verification.

For example, let Alice and Bob each hold half of the secret key denoted by Z and W respectively, Y denotes the ciphertext, and X denotes the plaintext. Good group encryption would meet both antecedents in (b) but fails the conclusion. An example of a naive group signature is to use a quadratic function as the secret key:

f ( t ) = x t 2 + y t + c .

And provide two different points z = ( t 1 , f 1 ) , w = ( t 2 , f 2 ) from f to Alice and Bob. Both antecedents in (b) are satisfied (by correctly translating the density) since the value of x yields no information about y . However, given both z and w then y is a determinstic function of x :

y = f 1 f 2 t 1 t 2 x ( t 1 + t 2 ) ,

and the independence no longer holds. Note that a third participant is necessary to reveal the entire secret key ( x , y , c ) . In practice, the calculation is usually done on an algebraic field/group, e.g. the elliptic curves, to deal with the problem with the density of x , y , c which is usually not uniform in the real number field.

User profile picture
2021-03-24 13:42
Comments