Cryptography Reference
In-Depth Information
v n being assigned different
simulator in Step 2, conditioned on vertices u n and
colors.
The circuit initiates an execution of V by placing G n on V 's common-input tape,
placing a uniformly selected r
q ( n ) on V 's local random tape, and placing
∈{
0
,
1
}
c n )on V 's incoming-message tape. The circuit reads the
outgoing message of V , denoted m .
the sequence ( c 1 ,...,
If m
=
( u n ,v n ), then the circuit outputs 0.
Otherwise (i.e., m
( u n ,v n )), the circuit invokes algorithm A and outputs
A G n ,
=
s u n
v n )
r
,
( c 1 ,...,
c n )
,
( u n )
,
s v n
(
Clearly, the size of A n is polynomial in n . We now evaluate the distinguishing
ability of A n . Let us first consider the probability that circuit A n will output 1 on
input a random commitment to the sequence 1 n 2 n 3 n . The reader can easily verify
that the sequence ( c 1 ,...,
c n ) constructed by circuit A n is distributed identically to
the sequence sent by the prover in Step P1. Hence, recalling some of the notations
introduced earlier, we get
A ν u n ,v n ( G n ) =
1
[ A n ( C (1 n 2 n 3 n ))
Pr
=
1]
=
q u n ,v n ( G n )
· Pr
On the other hand, we consider the probability that circuit A n will output 1
on input a random commitment to a uniformly chosen 3 n -long sequence over
{
1
,
2
,
3
}
. The reader can easily verify that the sequence ( c 1 ,...,
c n ) constructed
by circuit A n is distributed identically to the sequence ( d 1 ,...,
d n ) generated by
the simulator in Step 2, conditioned on e u n =
e v n . (Recall that d i =
C ( e i )
.
) Letting
T 3 n denote a random variable uniformly distributed over
{
1
,
2
,
3
}
3 n ,weget
A µ u n ,v n ( G n ) =
1
= p u n ,v n ( G n )
Pr
=
· Pr
[ A n ( C ( T 3 n ))
1]
where p u n ,v n ( G n ) denotes the probability that in Step 3 of the simulation the
verifier will answer with ( u n ,v n ), conditioned on e u n = e v n . Using the fact that
the proof of Claim 4.4.8.1 actually establishes that | Pr
[ M ( G n ) = ⊥ ]
2
3 | is
negligible in n , it follows that | p u n ,v n ( G n ) p u n ,v n ( G n ) | <
1
· p ( n ) 2 for all but at
3
most finitely many G n 's.
Justification for the last assertion: Note that p u n ,v n ( G n ) and p u n ,v n ( G n ) refer to
the same event (i.e., V 's request equals ( u n ,v n )), but under a different conditional
space (i.e., either e u n =
e v n or M ( G n )
). In fact, it is instructive to consider in
both cases the event that V 's request equals ( u n ,v n ) and e u n = e v n . Denoting the latter
event by X ,wehave 14
= ⊥
14 For further justification of the following equations, let X denote the event that V ' s request equals ( u n ,v n ),
and observe that X is the conjunction of X and e u n =
e v n . Then:
p u n ,v n ( G n ) = Pr [ X | e u n = e v n ],
Pr [ X & e u n = e v n ] / Pr [ e u n = e v n ] =
By
definition,
which
equals
Pr [ X ] / Pr [ e u n = e v n ].
By definition, p u n ,v n ( G n ) = Pr [ X | M ( G n ) = ⊥ ]. Note that the conjunction of M ( G n ) = ⊥ and X
implies e u n = e v n , and so the former conjunction implies X . On the other hand, X implies M ( G n ) = ⊥ .
It follows that Pr [ M ( G n ) = ⊥ ] · Pr [ X | M ( G n ) = ⊥ ] = Pr [ X & M ( G n ) = ⊥ ] = Pr [ X & M ( G n ) =
] = Pr [ X ]. We conclude that p u n ,v n ( G n ) = Pr [ X ] / Pr [ M ( G n ) = ⊥ ].
238
Search WWH ::




Custom Search