Any Arbitrary Function

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
1
down vote

favorite












According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?



For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:



$PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?



Note: PPT is a probabilistic polynomial-time algorithm



enter image description here







share|improve this question


























    up vote
    1
    down vote

    favorite












    According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?



    For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:



    $PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?



    Note: PPT is a probabilistic polynomial-time algorithm



    enter image description here







    share|improve this question
























      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?



      For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:



      $PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?



      Note: PPT is a probabilistic polynomial-time algorithm



      enter image description here







      share|improve this question














      According to the attached reference, does it mean that the adversary computes $PPT(initial~input)$, $PPT(z)$ and $PPT(f_i(x',y'))$?



      For example, suppose the corrupted party, in the malicious model, has inputs $x,z$ and it wants to compute $x land y$, then the adversary's output will be:



      $PPT(x)$, $PPT(z)$ and $PPT(x land y))$. Am I right?



      Note: PPT is a probabilistic polynomial-time algorithm



      enter image description here









      share|improve this question













      share|improve this question




      share|improve this question








      edited Sep 2 at 4:03

























      asked Sep 2 at 3:55









      AmirHosein Adavoudi

      398




      398




















          1 Answer
          1






          active

          oldest

          votes

















          up vote
          2
          down vote



          accepted










          It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.






          share|improve this answer




















          • Is my example correct?
            – AmirHosein Adavoudi
            Sep 2 at 4:04






          • 1




            What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
            – fkraiem
            Sep 2 at 4:06










          • The honest party sends y to the corrupted party.
            – AmirHosein Adavoudi
            Sep 2 at 4:09






          • 1




            We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
            – fkraiem
            Sep 2 at 4:11






          • 1




            Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
            – fkraiem
            Sep 2 at 4:18










          Your Answer




          StackExchange.ifUsing("editor", function ()
          return StackExchange.using("mathjaxEditing", function ()
          StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
          StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
          );
          );
          , "mathjax-editing");

          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "281"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          convertImagesToLinks: false,
          noModals: false,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          noCode: true, onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













           

          draft saved


          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f61969%2fany-arbitrary-function%23new-answer', 'question_page');

          );

          Post as a guest






























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          up vote
          2
          down vote



          accepted










          It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.






          share|improve this answer




















          • Is my example correct?
            – AmirHosein Adavoudi
            Sep 2 at 4:04






          • 1




            What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
            – fkraiem
            Sep 2 at 4:06










          • The honest party sends y to the corrupted party.
            – AmirHosein Adavoudi
            Sep 2 at 4:09






          • 1




            We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
            – fkraiem
            Sep 2 at 4:11






          • 1




            Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
            – fkraiem
            Sep 2 at 4:18














          up vote
          2
          down vote



          accepted










          It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.






          share|improve this answer




















          • Is my example correct?
            – AmirHosein Adavoudi
            Sep 2 at 4:04






          • 1




            What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
            – fkraiem
            Sep 2 at 4:06










          • The honest party sends y to the corrupted party.
            – AmirHosein Adavoudi
            Sep 2 at 4:09






          • 1




            We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
            – fkraiem
            Sep 2 at 4:11






          • 1




            Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
            – fkraiem
            Sep 2 at 4:18












          up vote
          2
          down vote



          accepted







          up vote
          2
          down vote



          accepted






          It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.






          share|improve this answer












          It means that the adversary can perform whatever (PPT) computation it wants based on all the information it has (namely, the corrupted party's input, the adversary's auxiliary input, and the value received from the trusted party) and output the result of that computation.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Sep 2 at 4:01









          fkraiem

          6,53721530




          6,53721530











          • Is my example correct?
            – AmirHosein Adavoudi
            Sep 2 at 4:04






          • 1




            What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
            – fkraiem
            Sep 2 at 4:06










          • The honest party sends y to the corrupted party.
            – AmirHosein Adavoudi
            Sep 2 at 4:09






          • 1




            We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
            – fkraiem
            Sep 2 at 4:11






          • 1




            Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
            – fkraiem
            Sep 2 at 4:18
















          • Is my example correct?
            – AmirHosein Adavoudi
            Sep 2 at 4:04






          • 1




            What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
            – fkraiem
            Sep 2 at 4:06










          • The honest party sends y to the corrupted party.
            – AmirHosein Adavoudi
            Sep 2 at 4:09






          • 1




            We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
            – fkraiem
            Sep 2 at 4:11






          • 1




            Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
            – fkraiem
            Sep 2 at 4:18















          Is my example correct?
          – AmirHosein Adavoudi
          Sep 2 at 4:04




          Is my example correct?
          – AmirHosein Adavoudi
          Sep 2 at 4:04




          1




          1




          What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
          – fkraiem
          Sep 2 at 4:06




          What is $y$ in your example? If the adversary has only $x$ and $z$, how can it compute $xwedge y$?
          – fkraiem
          Sep 2 at 4:06












          The honest party sends y to the corrupted party.
          – AmirHosein Adavoudi
          Sep 2 at 4:09




          The honest party sends y to the corrupted party.
          – AmirHosein Adavoudi
          Sep 2 at 4:09




          1




          1




          We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
          – fkraiem
          Sep 2 at 4:11




          We are here in the ideal world; the parties do not communicate with each other directly, only through the trusted party.
          – fkraiem
          Sep 2 at 4:11




          1




          1




          Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
          – fkraiem
          Sep 2 at 4:18




          Not really. What you describe is one possibility, but there are others. The adversary can for example output $xwedge ywedge z$.
          – fkraiem
          Sep 2 at 4:18

















           

          draft saved


          draft discarded















































           


          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f61969%2fany-arbitrary-function%23new-answer', 'question_page');

          );

          Post as a guest













































































          Comments

          Popular posts from this blog

          What does second last employer means? [closed]

          List of Gilmore Girls characters

          One-line joke