Paper 2020/1312
Individual Simulations
Yi Deng
Abstract
We develop an individual simulation technique that explicitly makes use of particular properties/structures of a given adversary's functionality. Using this simulation technique, we obtain the following results. 1. We construct the first protocols that \emph{break previous black-box barriers} of [Xiao, TCC'11 and Alwen et al., Crypto'05] under the standard hardness of factoring, both of which are polynomial time simulatable against all a-priori bounded polynomial size distinguishers: -- Two-round selective opening secure commitment scheme. -- Three-round concurrent zero knowledge and concurrent witness hiding argument for NP in the bare public-key model. 2. We present a simpler two-round weak zero knowledge and witness hiding argument for NP in the plain model under the sub-exponential hardness of factoring. Our technique also yields a significantly simpler proof that existing distinguisher-dependent simulatable zero knowledge protocols are also polynomial time simulatable against all distinguishers of a-priori bounded polynomial size. The core conceptual idea underlying our individual simulation technique is an observation of the existence of nearly optimal extractors for all hard distributions: For any NP-instance(s) sampling algorithm, there exists a polynomial-size witness extractor (depending on the sampler's functionality) that almost outperforms any circuit of a-priori bounded polynomial size in terms of the success probability.
Metadata
- Available format(s)
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2020
- Contact author(s)
- deng @ iie ac cn
- History
- 2020-10-23: last of 4 revisions
- 2020-10-21: received
- See all versions
- Short URL
- https://ia.cr/2020/1312
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/1312, author = {Yi Deng}, title = {Individual Simulations}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/1312}, year = {2020}, url = {https://eprint.iacr.org/2020/1312} }