How to simulate it – A tutorial on the simulation proof technique

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

195 Scopus citations

Abstract

One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Pages277-346
Number of pages70
Edition9783319570471
DOIs
StatePublished - 2017

Publication series

NameInformation Security and Cryptography
Number9783319570471
Volume0
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Bibliographical note

Publisher Copyright:
© 2017, Springer International Publishing AG.

Fingerprint

Dive into the research topics of 'How to simulate it – A tutorial on the simulation proof technique'. Together they form a unique fingerprint.

Cite this