How to simulate it – A tutorial on the simulation proof technique

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

121 Scopus citations


One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Number of pages70
StatePublished - 2017

Publication series

NameInformation Security and Cryptography
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Bibliographical note

Publisher Copyright:
© 2017, Springer International Publishing AG.


Dive into the research topics of 'How to simulate it – A tutorial on the simulation proof technique'. Together they form a unique fingerprint.

Cite this