Special Topics in Cryptography
Mohammad Mahmoody
Special Topics in Cryptography Mohammad Mahmoody Logistics Most - - PowerPoint PPT Presentation
Special Topics in Cryptography Mohammad Mahmoody Logistics Most submitted PS3. If you have not you will get delay, but email it to me ASAP. Deadline for project reports/drafts + slides : This Thursday 5pm. There will be a collab post for
Mohammad Mahmoody
me ASAP.
will be a collab post for it.
any of the remaining days.
𝑀 ⇔ ∃ 𝑥, 𝑊 𝑦, 𝑥 = 1
1. Is sound if: for all even malicious prover 𝑄∗ : Pr 𝑊 𝑦 = 1 ≤ negl(𝑜) 2. Is zero-knowledge if: for all even malicious verifier 𝑊∗ ∃ 𝑇 such that 𝑇 𝑦 ≈ view(𝑊) in interaction with 𝑄 on input 𝑦
1, … , 𝑄 𝑛 want to compute 𝑔(𝑦1, … , 𝑦𝑛) “securely” :
protocol, but at the end tries to extract information.
1. Alice writes f as a circuit C 2. Convert C into a “garbled” version G where:
3. Alice sends G (and related keys) to Bob 4. Bob gets right keys for his own inputs using OT protocol. 5. Bob “executes” the circuit and sends the answer back.
AND OR AND NOT OR AND
Alice’s inputs Bob’s inputs
AND
x y z
k0z, k1z Alice Bob k0x, k1x k0y, k1y