Cryptography Reference
In-Depth Information
and
( x , r ) are identically distributed for every x and r . Observe that once r is
fixed, the message sent by V , on common input x , random tape r , and incoming
message H , is uniquely defined. Let us denote this message by
µ
v ( x
,
r
,
H ). We
show that both
ν
( x
,
r ) and
µ
( x
,
r ) are uniformly distributed over the set
= ( H ): H = ψ G v ( x , r , H )
def
C x , r
where (again) ψ ( G ) denotes the graph obtained from G by relabeling the vertices
using the permutation
ψ
(i.e., if G =
( V , E ), then
ψ
=
( V , F ), so that ( u ,v
( G )
)
E iff (
F ). The proof of this statement is rather tedious and is
unrelated to the subjects of this topic (and hence can be skipped with no damage).
ψ
( u )
(
v
))
The proof is slightly non-trivial because it relates (at least implicitly) to the automor-
phism group of the graph G 2 (i.e., the set of permutations
( G 2 ) is identical
with G 2 , not just isomorphic to G 2 ). For simplicity, consider first the special case in
which the automorphism group of G 2 consists of merely the identity permutation (i.e.,
G 2 = π ( G 2 ) if and only if π is the identity permutation). In this case, ( H ) C x , r
if and only if H is isomorphic to (both G 1 and) G 2 and
π
for which
π
ψ
is the (unique) isomorphism
| V 2 |
between H and G v ( x , r , H ) . Hence, C x , r contains exactly
! pairs, each containing a
different graph H as the first element. In the general case, ( H
)
C x , r if and only
if H is isomorphic to (both G 1 and) G 2 and
ψ
is an isomorphism between H and
v ( x
G v ( x , r , H ) . We stress that
H ) is the same in all pairs containing H . Let aut( G 2 )
denote the size of the automorphism group of G 2 . Then each H (isomorphic to G 2 )
appears in exactly aut( G 2 ) pairs of C x , r , and each such pair contains a different iso-
morphism between H and G v ( x , r , H ) . The number of different H 's that are isomorphic
to G 2 is | V 2 | ! / aut( G 2 ), and so | C x , r |=| V 2 | ! also in the general case.
We first consider the random variable
,
r
,
r ) (describing the suffix of m ( x )). Re-
call that µ ( x , r ) is defined by the following two-step random process. In the first step,
one selects uniformly a pair (
µ
( x
,
permutation), and sets
H = ψ ( G τ ). In the second step, one outputs (i.e., sets µ ( x , r ) to) ( ψ ( G τ ) )if
v ( x
τ,ψ
), over the set of pairs (
{
1
,
2
) pair otherwise). Hence, each graph H (iso-
morphic to G 2 ) is generated, at the first step, by exactly aut( G 2 ) different (1
,
r
,
H )
= τ
(and ignores the (
τ,ψ
, ·
)-pairs
(i.e., the pairs (1
) satisfying H
= ψ
( G 1 )) and by exactly aut( G 2 ) different (2
, ·
)-
pairs (i.e., the pairs (2
aut( G 2 ) pairs yield the
same graph H and hence lead to the same value of v ( x , r , H ). It follows that out of the
2
) satisfying H
= ψ
( G 2 )). All these 2
·
( G τ ), only the aut( G 2 )
pairs satisfying τ = v ( x , r , H ) lead to an output. Hence, for each H (that is isomor-
phic to G 2 ), the probability that
·
aut( G 2 ) pairs of the form (
τ,ψ
) that yield the graph H
= ψ
µ
( x
,
r )
=
( H
, ·
) equals aut( G 2 )
/
(
|
V 2 |
!). Furthermore,
for each H (that is isomorphic to G 2 ),
1
| V 2 | !
= ψ G v ( x , r , H )
if
H
Pr [ µ ( x , r ) = ( H )] =
0
otherwise
( x , r ) is uniformly distributed over C x , r .
We now consider the random variable
µ
Hence
r ) (describing the suffix of the veri-
fier's view in a “real interaction” with the prover). Recall that
ν
( x
,
ν
( x
,
r ) is defined by
selecting uniformly a permutation
π
(over the set V 2 ) and setting
ν
( x
,
r )
=
(
π
( G 2 )
)
v ( x
if
is the iso-
morphism between G 1 and G 2 . Clearly, for each H (that is isomorphic to G 2 ), the
probability that
,
r
( G 2 ))
=
2, and
ν
( x
,
r )
=
(
π
( G 2 )
φ
) otherwise, where
φ
ν
( x
,
r )
=
( H
, ·
) equals aut( G 2 )
/
(
|
V 2 |
!). Furthermore, for each H (that
Search WWH ::




Custom Search