Comparing two notions of simulatability

17Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notion of security considers a protocol π as secure as an idealization τ of the protocol task, if and only if every attack on π can be simulated by an attack on τ. Two formalizations, which both provide secure composition of protocols, are common: standard simulatability means that for every π-attack and protocol user H, there is a τ-attack, such that H cannot distinguish π from τ. Universal simulatability means that for every π-attack, there is a τ-attack, such that no protocol user H can distinguish π from τ. Trivially, universal simulatability implies standard simulatability. We show: the converse is true with respect to perfect security, but not with respect to computational or statistical security. Besides, we give a formal definition of a time-lock puzzle, which may be of independent interest. Although the described results do not depend on any computational assumption, we show that the existence of a timelock puzzle gives an even stronger separation of standard and universal simulatability with respect to computational security. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hofheinz, D., & Unruh, D. (2005). Comparing two notions of simulatability. In Lecture Notes in Computer Science (Vol. 3378, pp. 86–103). Springer Verlag. https://doi.org/10.1007/978-3-540-30576-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free