@inbook{b4382bf6e81a41bd9041e007eea35768,
title = "How to simulate it – A tutorial on the simulation proof technique",
abstract = "One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.",
author = "Yehuda Lindell",
note = "Publisher Copyright: {\textcopyright} 2017, Springer International Publishing AG.",
year = "2017",
doi = "10.1007/978-3-319-57048-8_6",
language = "الإنجليزيّة",
series = "Information Security and Cryptography",
number = "9783319570471",
pages = "277--346",
booktitle = "Information Security and Cryptography",
edition = "9783319570471",
}