How to simulate it – A tutorial on the simulation proof technique

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
Pages277-346
Number of pages70
Edition9783319570471
DOIs
StatePublished - 2017

Publication series

NameInformation Security and Cryptography
Number9783319570471
Volume0

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Computational Theory and Mathematics
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'How to simulate it – A tutorial on the simulation proof technique'. Together they form a unique fingerprint.

Cite this