Handling expected polynomial-time strategies in simulation-based security proofs
Title | Handling expected polynomial-time strategies in simulation-based security proofs |
Publication Type | Journal Articles |
Year of Publication | 2008 |
Authors | Katz J, Lindell Y |
Journal | Journal of Cryptology |
Volume | 21 |
Issue | 3 |
Pagination | 303 - 349 |
Date Published | 2008/// |
Abstract | The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines. However, expected polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only known simulation techniques run in expected (and not strict) polynomial time. In addition, it has been shown that expected polynomial-time simulation is essential for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in simulation-based security proofs. |
DOI | 10.1007/s00145-007-9004-8 |