Abstract
The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines (or circuits). However, expected polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only simulation techniques known run in expected (and not strict) polynomial-time. In addition, it has been shown that expected polynomial-time simulation is essential for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in the context of simulation-based security proofs. © Springer-Verlag Berlin Heidelberg 2005.
Cite
CITATION STYLE
Katz, J., & Lindell, Y. (2005). Handling expected polynomial-time strategies in simulation-based security proofs. In Lecture Notes in Computer Science (Vol. 3378, pp. 128–149). Springer Verlag. https://doi.org/10.1007/978-3-540-30576-7_8
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.