Paper 2011/514
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols
Mohammad Sadeq Dousti and Rasool Jalili
Abstract
Many cryptographic primitives---such as pseudorandom generators, encryption schemes, and zero-knowledge proofs---center around the notion of \emph{approximability}. For instance, a pseudorandom generator is an expanding function which on a random seed, \emph{approximates} the uniform distribution. In this paper, we classify different notions of computational approximability in the literature, and provide several new types of approximability. More specifically, we identify two hierarchies of computational approximability: The first hierarchy ranges from \emph{strong} approximability---which is the most common type in the cryptography---to the \emph{weak} approximability---as defined by Dwork \emph{et al.} (FOCS 1999). We define semi-strong, mild, and semi-weak types as well. The second hierarchy, termed
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Preprint. MINOR revision.Revised version is submitted to IEEE TC.
- Keywords
- ApproximabilityIndistinguishabilityZero KnowledgeRandom OracleTrapdoor One-Way PermutationSequential Composition.
- Contact author(s)
-
msdousti @ gmail com
dousti @ ce sharif edu - History
- 2014-06-17: last of 2 revisions
- 2011-09-22: received
- See all versions
- Short URL
- https://ia.cr/2011/514
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/514, author = {Mohammad Sadeq Dousti and Rasool Jalili}, title = {Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/514}, year = {2011}, url = {https://eprint.iacr.org/2011/514} }