One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.
CITATION STYLE
Lindell, Y. (2017). How to simulate it – A tutorial on the simulation proof technique. In Information Security and Cryptography (Vol. 0, pp. 277–346). Springer International Publishing. https://doi.org/10.1007/978-3-319-57048-8_6
Mendeley helps you to discover research relevant for your work.