2018
DOI: 10.1007/978-3-319-78372-7_12
|View full text |Cite
|
Sign up to set email alerts
|

On the Complexity of Simulating Auxiliary Input

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Remark 1.2 (Auxiliary input simulators, and the leakage simulation lemmas). Theorem 1.1 is similar in spirit to the so called "leakage simulation lemma" [33,26,35,31,32,5].…”
Section: Every Two-party Single Bit Output Protocol Has a Simulator And A Forecastermentioning
confidence: 84%
See 2 more Smart Citations
“…Remark 1.2 (Auxiliary input simulators, and the leakage simulation lemmas). Theorem 1.1 is similar in spirit to the so called "leakage simulation lemma" [33,26,35,31,32,5].…”
Section: Every Two-party Single Bit Output Protocol Has a Simulator And A Forecastermentioning
confidence: 84%
“…This is crucial in our applications. In contrast, in the leakage simulation lemma the simulator is a circuit of size s ′ > s and does not belong to the class C. Moreover, there are negative results [33,5] showing limitations on proving the leakage simulation lemma with s ′ ≤ s.…”
Section: Every Two-party Single Bit Output Protocol Has a Simulator A...mentioning
confidence: 99%
See 1 more Smart Citation
“…The existence of an algorithm to construct the simulator h was dubbed the leakage simulation lemma by Chen, Chung, and Liao [CCL18]. The algorithm, much like those for achieving outcome indistinguishability, appears in two variants in the literature: one based on projected gradient descent-like steps [JP14, TTV09, Sko17], and the other based on multiplicative weight updates [VZ13,CCL18].…”
Section: Connection To Cryptographymentioning
confidence: 99%
“…Theorem 2.1 (Imported Theorem [CCL18]). Let n, ℓ ∈ N, ǫ > 0, and C leak be a family of distinguisher circuits from {0, 1} n × {0, 1} ℓ → {0, 1} of size s(n).…”
Section: Preliminariesmentioning
confidence: 99%