How to simulate it – A tutorial on the simulation proof technique

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
Number of pages70
StatePublished - 2017

Publication series

NameInformation Security and Cryptography

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Computational Theory and Mathematics
  • Information Systems and Management


Dive into the research topics of 'How to simulate it – A tutorial on the simulation proof technique'. Together they form a unique fingerprint.

Cite this