Handling expected polynomial-time strategies in simulation-based security proofs

14Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines (or circuits). However, expected polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only simulation techniques known run in expected (and not strict) polynomial-time. In addition, it has been shown that expected polynomial-time simulation is essential for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in the context of simulation-based security proofs. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Katz, J., & Lindell, Y. (2005). Handling expected polynomial-time strategies in simulation-based security proofs. In Lecture Notes in Computer Science (Vol. 3378, pp. 128–149). Springer Verlag. https://doi.org/10.1007/978-3-540-30576-7_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free