On Expected Probabilistic Polynomial-Time Adversaries: A suggestion for restricted de nitions and their bene ts
نویسنده
چکیده
This paper concerns the possibility of developing a coherent theory of security when feasibility is associated with expected probabilistic polynomial-time (expected PPT). The source of diiculty is that the known deenitions of expected PPT strategies (i.e., expected PPT interactive machines) do not support natural results of the type presented below. To overcome this diiculty, we suggest new deenitions of expected PPT strategies, which are more restrictive than the known deenitions (but nevertheless extend the notion of expected PPT non-interactive algorithms). We advocate the conceptual adequacy of these deenitions, and point out their technical advantages. Speciically, identifying a natural subclass of black-box simulators, called normal, we prove the following two results: 1. Security proofs that refer to all strict PPT adversaries (and are proven via normal black-box simulators), extend to provide security with respect to all adversaries that satisfy the restricted deenitions of expected PPT. 2. Security composition theorems of the type known for strict PPT hold for these restricted deenitions of expected PPT, where security means simulation by normal black-box simu-lators. Speciically, a normal black-box simulator is required to make an expected polynomial number of steps, when given oracle access to any strategy, where each oracle call is counted as a single step. This natural property is satisses by most known simulators and is easy to verify.
منابع مشابه
Sophisticated crosscuts for e-commerce
AOP [2] introduced the notion of crosscutting concerns in programming. An aspect groups a crosscut (aka. pointcut in Aspect-J [3]) which relates several points of interest (aka. join points) of the base application with an action (aka. advice) to be performed. This article argues for a clear separation of crosscut and action de nitions. The tools for AOP currently available support only simple ...
متن کاملUsing C++ Templates to Implement Role-Based Designs
Within the object-oriented technology community, much recent work on design reuse has focused on role-based collaborations distributed across multiple objects. Many bene ts can be derived by mapping role-based designs directly into implementations, including greater ease in maintaining the connection between designs and implementations under change, and the opportunity for code reuse along with...
متن کاملWhen Experience Is Wrong: Examining CBR for Changing Tasks and Environments
Case-based problem-solving systems reason and learn from experiences, building up case libraries of problems and solutions to guide future reasoning. The expected bene ts of this learning process depend on two types of regularity: (1) problem-solution regularity, the relationship between problem-to-problem and solution-to-solution similarity measures that assures that solutions to similar prior...
متن کاملA General Parallel Tabu Search Algorithm For Combinatorial Optimisation Problems ?
Tabu Search (TS) is a meta-heuristic search algorithm that is easy to parallelise. E cient parallelisation of TS can represent a signi cant saving in the real-time required to solve a problem over an equivalent sequential algorithm. In this study, a general parallel TS algorithm for solving combinatorial optimisation problems (COPs) is presented. The unique feature of our approach is that the T...
متن کاملUsing the Voronoi Tessellation for Grouping Words and Multi-part Symbols in Documents
We examine the importance of the de nition of neighbors and neigh borhoods for grouping in document understanding and list some previous de nitions We present a number of bene ts to using the Voronoi neigh borhood de nition however we argue that de nitions based upon the point Voronoi diagrams are insu cient in the general case e g for group ing image elements in line drawings We give the de ni...
متن کامل