How to Go Beyond the Black-Box Simulation Barrier
نویسنده
چکیده
The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary’s algorithm as a black-box. We present the first constructions of non-black-box simulators. Using these new non-black-box techniques we obtain several results that were previously shown to be impossible to obtain using black-box simulators. Specifically, assuming the existence of collision-resistent hash functions, we construct a new zero-knowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining Properties 1 and 2 has been proven to be impossible to achieve using black-box simulators. 3. It is an Arthur-Merlin (public coins) protocol. Simultaneously obtaining Properties 1 and 3 has also been proven to be impossible to achieve with a black-box simulator. 4. It has a simulator that runs in strict polynomial time, rather than in expected polynomial time. All previously known zero-knowledge arguments satisfying Property 1 utilized expected polynomial-time simulators. Following this work it was shown that simultaneously obtaining Properties 1 and 4 is also impossible to achieve with a black-box simulator.
منابع مشابه
Beyond the Black Box Approach to Ethics!; Comment on “Expanded HTA: Enhancing Fairness and Legitimacy”
In the editorial published in this journal, Daniels and colleagues argue that his and Sabin’s accountability for reasonableness (A4R) framework should be used to handle ethical issues in the health technology assessment (HTA)-process, especially concerning fairness. In contrast to this suggestion, it is argued that such an approach risks suffering from the irrrelevance or insufficiency they war...
متن کاملBeyond opening up the black box: Investigating the role of algorithmic systems in Wikipedian organizational culture
Scholars and practitioners across domains are increasingly concerned with algorithmic transparency and opacity, interrogating the values and assumptions embedded in automated, black-boxed systems, particularly in user-generated content platforms. I report from an ethnography of infrastructure in Wikipedia to discuss an often understudied aspect of this topic: the local, contextual, learned expe...
متن کاملBarrier options pricing of fractional version of the Black-Scholes model
In this paper two different methods are presented to approximate the solution of the fractional Black-Scholes equation for valuation of barrier option. Also, the two schemes need less computational work in comparison with the traditional methods. In this work, we propose a new generalization of the two-dimensional differential transform method and decomposition method that will extend the appli...
متن کاملBlack-Box Optimization of Lighting Simulation in Architectural Design
This paper deals with an application of optimization in architectural design. Formally, we consider the problem of optimizing a function that can only be evaluated through an expensive oracle. We assume that the analytical expression of the function is unknown and first-order information is not available. This situation frequently occurs when each function evaluation relies on the output of a c...
متن کاملApproaches to Congestion Control in packet networks
We discuss congestion control algorithms, using network awareness as a criterion to categorize different approaches. The first category (”the box is black”) consists of a group of algorithms that consider the network as black box, assuming no knowledge of its state, other than the binary feedback upon congestion. The second category (”the box is grey”) groups approaches that use measurements to...
متن کامل