Skip to main navigation Skip to search Skip to main content

Handling expected polynomial-time strategies in simulation-based security proofs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines (or circuits). However, expected polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only simulation techniques known run in expected (and not strict) polynomial-time. In addition, it has been shown that expected polynomial-time simulation is essential for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in the context of simulation-based security proofs.

Original languageEnglish
Title of host publicationTheory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
PublisherSpringer Verlag
Pages128-149
Number of pages22
ISBN (Electronic)3540245731
DOIs
StatePublished - 2005
Event2nd Theory of Cryptography Conference, TCC 2005 - Cambridge, MA, United States
Duration: 10 Feb 200512 Feb 2005

Publication series

NameLecture Notes in Computer Science
Volume3378
ISSN (Print)0302-9743

Conference

Conference2nd Theory of Cryptography Conference, TCC 2005
Country/TerritoryUnited States
CityCambridge, MA
Period10/02/0512/02/05

Fingerprint

Dive into the research topics of 'Handling expected polynomial-time strategies in simulation-based security proofs'. Together they form a unique fingerprint.

Cite this