Weizmann Logo
ECCC
Electronic Colloquium on Computational Complexity

Under the auspices of the Computational Complexity Foundation (CCF)

Login | Register | Classic Style



REPORTS > DETAIL:

Paper:

TR17-112 | 27th June 2017 09:23

How To Simulate It -- A Tutorial on the Simulation Proof Technique

RSS-Feed




TR17-112
Authors: Yehuda Lindell
Publication: 27th June 2017 10:03
Downloads: 144
Keywords: 


Abstract:

One of the most fundamental notions of cryptography is that of \emph{simulation}. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a non-trivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.



ISSN 1433-8092 | Imprint