[Resource Topic] 2005/379: Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs

Welcome to the resource topic for 2005/379

Title:
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs

Authors: Jonathan Katz, Yehuda Lindell

Abstract:

The standard class of adversaries considered in cryptography is that of {\em strict} polynomial-time probabilistic machines. However, {\em expected} polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only known simulation techniques run in expected (and not strict) polynomial time. In addition, it has been shown that expected polynomial-time simulation is {\em essential} for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in simulation-based security proofs.

ePrint: https://eprint.iacr.org/2005/379

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .