How to simulate it – A tutorial on the simulation proof technique

172Citations
Citations of this article
224Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.

Cite

CITATION STYLE

APA

Lindell, Y. (2017). How to simulate it – A tutorial on the simulation proof technique. In Information Security and Cryptography (Vol. 0, pp. 277–346). Springer International Publishing. https://doi.org/10.1007/978-3-319-57048-8_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free