DocumentCode :
1710353
Title :
How to go beyond the black-box simulation barrier
Author :
Barak, Boaz
Author_Institution :
Dept. of Comput. Sci., Weizmann Inst. of Sci., Rehovot, Israel
fYear :
2001
Firstpage :
106
Lastpage :
115
Abstract :
The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary´s algorithm as a black-box. We present the first constructions of non-black-box simulators. Using these new non-black-box techniques, we obtain several results that were previously proven to be impossible to obtain using black-box simulators. Specifically, assuming the existence of collision resistent hash functions, we construct a new zero-knowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining 1 and 2 has been recently proven to be impossible to achieve using black-box simulators. 3. It is an Arthur-Merlin (public coins) protocol. Simultaneously obtaining 1 and 3 was known to be impossible to achieve with a black-box simulator. 4. It has a simulator that runs in strict polynomial time, rather than in expected polynomial time. All previously known constant-round, negligible-error zero-knowledge arguments utilized expected polynomial-time simulators.
Keywords :
computational complexity; cryptography; digital simulation; protocols; Arthur-Merlin protocol; NP; adversary algorithm; black-box simulation barrier; black-box simulators; collision resistent hash functions; constant-round negligible-error zero-knowledge arguments; cryptography; expected polynomial time; honest party; negligible soundness error; non-black-box simulators; polynomial-time simulators; private input; public coins protocol; security parameter; simulation paradigm; strict polynomial time; zero-knowledge argument system; Access protocols; Computational modeling; Computer science; Computer simulation; Cryptography; Knowledge management; Polynomials; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on
Print_ISBN :
0-7695-1116-3
Type :
conf
DOI :
10.1109/SFCS.2001.959885
Filename :
959885
Link To Document :
بازگشت