In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notion of security considers a protocol π as secure as an idealization τ of the protocol task, if and only if every attack on π can be simulated by an attack on τ. Two formalizations, which both provide secure composition of protocols, are common: standard simulatability means that for every π-attack and protocol user H, there is a τ-attack, such that H cannot distinguish π from τ. Universal simulatability means that for every π-attack, there is a τ-attack, such that no protocol user H can distinguish π from τ. Trivially, universal simulatability implies standard simulatability. We show: the converse is true with respect to perfect security, but not with respect to computational or statistical security. Besides, we give a formal definition of a time-lock puzzle, which may be of independent interest. Although the described results do not depend on any computational assumption, we show that the existence of a timelock puzzle gives an even stronger separation of standard and universal simulatability with respect to computational security. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Hofheinz, D., & Unruh, D. (2005). Comparing two notions of simulatability. In Lecture Notes in Computer Science (Vol. 3378, pp. 86–103). Springer Verlag. https://doi.org/10.1007/978-3-540-30576-7_6
Mendeley helps you to discover research relevant for your work.