Any Arbitrary Function
Clash Royale CLAN TAG#URR8PPP
up vote
1
down vote
favorite
According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?
For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:
$PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?
Note: PPT is a probabilistic polynomial-time algorithm
provable-security security-definition
add a comment |Â
up vote
1
down vote
favorite
According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?
For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:
$PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?
Note: PPT is a probabilistic polynomial-time algorithm
provable-security security-definition
add a comment |Â
up vote
1
down vote
favorite
up vote
1
down vote
favorite
According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?
For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:
$PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?
Note: PPT is a probabilistic polynomial-time algorithm
provable-security security-definition
According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?
For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:
$PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?
Note: PPT is a probabilistic polynomial-time algorithm
provable-security security-definition
edited Sep 2 at 4:03
asked Sep 2 at 3:55


AmirHosein Adavoudi
398
398
add a comment |Â
add a comment |Â
1 Answer
1
active
oldest
votes
up vote
2
down vote
accepted
It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
1
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
1
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
1
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
 |Â
show 2 more comments
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
accepted
It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
1
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
1
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
1
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
 |Â
show 2 more comments
up vote
2
down vote
accepted
It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
1
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
1
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
1
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
 |Â
show 2 more comments
up vote
2
down vote
accepted
up vote
2
down vote
accepted
It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.
It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.
answered Sep 2 at 4:01


fkraiem
6,53721530
6,53721530
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
1
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
1
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
1
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
 |Â
show 2 more comments
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
1
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
1
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
1
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
Is my example correct?
– AmirHosein Adavoudi
Sep 2 at 4:04
1
1
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
– fkraiem
Sep 2 at 4:06
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
The honest party sends y to the corrupted party.
– AmirHosein Adavoudi
Sep 2 at 4:09
1
1
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
– fkraiem
Sep 2 at 4:11
1
1
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
– fkraiem
Sep 2 at 4:18
 |Â
show 2 more comments
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f61969%2fany-arbitrary-function%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password