Paper 2017/330
Distinguisher-Dependent Simulation in Two Rounds and its Applications
Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, and Ron Rothblum
Abstract
We devise a novel simulation technique that makes black-box use of the adversary as well as the distinguisher. Using this technique we construct several round-optimal protocols, many of which were previously unknown even using non-black-box simulation techniques:
- Two-round witness indistinguishable (WI) arguments for
Note: Three round protocols have been updated.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- A minor revision of an IACR publication in CRYPTO 2017
- Keywords
- input-delayedweak zero knowledgestrong witness indistinguishabilitywitness hidingtwo roundsinput indistinguishable computation
- Contact author(s)
- dakshita @ cs ucla edu
- History
- 2017-12-01: last of 4 revisions
- 2017-04-17: received
- See all versions
- Short URL
- https://ia.cr/2017/330
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/330, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/330}, year = {2017}, url = {https://eprint.iacr.org/2017/330} }