%PDF-1.4
5 0 obj
<< /S /GoTo /D (tabOfCont.1) >>
endobj
8 0 obj
(Table of contents)
endobj
9 0 obj
<< /S /GoTo /D (section.1) >>
endobj
12 0 obj
(Introduction)
endobj
13 0 obj
<< /S /GoTo /D (subsection.1.1) >>
endobj
16 0 obj
(Related Works.)
endobj
17 0 obj
<< /S /GoTo /D (subsection.1.2) >>
endobj
20 0 obj
(Overview of this paper.)
endobj
21 0 obj
<< /S /GoTo /D (section.2) >>
endobj
24 0 obj
(Model and Results)
endobj
25 0 obj
<< /S /GoTo /D (subsection.2.1) >>
endobj
28 0 obj
(Our Results.)
endobj
29 0 obj
<< /S /GoTo /D (section.3) >>
endobj
32 0 obj
(Overview of Our Techniques.)
endobj
33 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
36 0 obj
(Preliminaries.)
endobj
37 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
40 0 obj
(First Attempt: The Brute Force Protocol)
endobj
41 0 obj
<< /S /GoTo /D (subsection.3.3) >>
endobj
44 0 obj
(Second Attempt: The Condensed Protocol)
endobj
45 0 obj
<< /S /GoTo /D (subsection.3.4) >>
endobj
48 0 obj
(The Combined Protocol: Two Protocols with Two Simulators.)
endobj
49 0 obj
<< /S /GoTo /D (subsection.3.5) >>
endobj
52 0 obj
(Some issues and subtleties.)
endobj
53 0 obj
<< /S /GoTo /D (subsection.3.6) >>
endobj
56 0 obj
(Guide to the actual protocol and proof.)
endobj
57 0 obj
<< /S /GoTo /D (section.4) >>
endobj
60 0 obj
(Construction of a Concurrent and Non-Malleable Zero-Knowledge Protocol)
endobj
61 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
64 0 obj
(Preliminaries)
endobj
65 0 obj
<< /S /GoTo /D (subsection.4.2) >>
endobj
68 0 obj
(The protocol.)
endobj
69 0 obj
<< /S /GoTo /D (subsubsection.4.2.1) >>
endobj
72 0 obj
(Components.)
endobj
73 0 obj
<< /S /GoTo /D (subsubsection.4.2.2) >>
endobj
76 0 obj
(Operation of the protocol.)
endobj
77 0 obj
<< /S /GoTo /D (subsubsection.4.2.3) >>
endobj
80 0 obj
(Witness-based continuation \(WBC\) compiler.)
endobj
81 0 obj
<< /S /GoTo /D (subsection.4.3) >>
endobj
84 0 obj
(The \(actual\) simulator Sim.)
endobj
85 0 obj
<< /S /GoTo /D (section.5) >>
endobj
88 0 obj
(The Virtual Simulator VSim.)
endobj
89 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
92 0 obj
(Description of the Virtual Simulator VSim)
endobj
93 0 obj
<< /S /GoTo /D (subsubsection.5.1.1) >>
endobj
96 0 obj
(Notations, inputs and global variables.)
endobj
97 0 obj
<< /S /GoTo /D (subsubsection.5.1.2) >>
endobj
100 0 obj
(Simulation of Honest Verifier VHV.)
endobj
101 0 obj
<< /S /GoTo /D (subsubsection.5.1.3) >>
endobj
104 0 obj
(Simulation of the honest prover VHP)
endobj
105 0 obj
<< /S /GoTo /D (subsubsection.5.1.4) >>
endobj
108 0 obj
(Description of Cont.)
endobj
109 0 obj
<< /S /GoTo /D (subsection.5.2) >>
endobj
112 0 obj
(Completeness of VSim)
endobj
113 0 obj
<< /S /GoTo /D (subsection.5.3) >>
endobj
116 0 obj
(T5-Indistinguishability of VSim)
endobj
117 0 obj
<< /S /GoTo /D (subsubsection.5.3.1) >>
endobj
120 0 obj
(Moving to simulation of VHV.)
endobj
121 0 obj
<< /S /GoTo /D (subsubsection.5.3.2) >>
endobj
124 0 obj
(Moving to simulation of VHP)
endobj
125 0 obj
<< /S /GoTo /D (subsection.5.4) >>
endobj
128 0 obj
(Simulation-Soundness of VSim)
endobj
129 0 obj
<< /S /GoTo /D (section.6) >>
endobj
132 0 obj
(Construction of a Concurrently Secure Multi-Party Protocol)
endobj
133 0 obj
<< /S /GoTo /D (subsection.6.1) >>
endobj
136 0 obj
(Description of S)
endobj
137 0 obj
<< /S /GoTo /D (subsection.6.2) >>
endobj
140 0 obj
(Indistinguishability)
endobj
141 0 obj
<< /S /GoTo /D (section.7) >>
endobj
144 0 obj
(Security against Adaptive Adversaries)
endobj
145 0 obj
<< /S /GoTo /D (section.8) >>
endobj
148 0 obj
(Conclusions and future directions.)
endobj
149 0 obj
<< /S /GoTo /D (section*.46) >>
endobj
152 0 obj
(References)
endobj
153 0 obj
<< /S /GoTo /D [154 0 R /Fit ] >>
endobj
156 0 obj <<
/Length 3019
/Filter /FlateDecode
>>
stream
xڭYK`"JD0O^YDzCr|%"XjU{ I+n@b{:0~UqVB&e:S$OȺWzF[\_)]}#d:,{u440uz\ߗ}<℅Rd@%N"!?f5:lVwqñkZ&WU_nrV݀-女.hJϲդNl
b/>V6~I=m.xt!v*h$#)Ztmǜ:Lf!q*:=Fl~ŵI{eZف^Įg.e< uYd<6Bu[>J3Lie_RwQ6QdFMt6{,9V[oLljx$6S1c]fF>I{,C٦<<!v#Na1P^i%n< K?kJ;$:=
lOSqTl>VpB9YiJ1Xbv12bÜ3xfYh|vrK!6Hayɇ[䩠,,
3-GZeNU]I d[Y ͋f9$NSAi\NTȔTVnY+
&ɵ_!gɛF ۈLVtG e
Ukt5xXMw8lL#Dl"Z}R#6XSD(.Z;T [<ָŨF7G|ɈqR;Obg-jAB[7t^~^$P4/;KYlFTjkF̕TȐ N s6_zg(|}͌#kG=
p&NA6II-nӻv)>%jÎ18+e Ƀ&w~ycF,+z~Eh2D|+@&p0wˁpW)L@241
2d*eCQN Uqh]KǀF~[cA$e
솖Fέ GjzEm%G){\rFbA#Ѓ
K.ryRUF^S p" DcE\#c0ʎG.26I-0:<-IЏY(6cJB)M;13cP5mHU)n;Jfx]/odNߤ,qs7;r
iHL~ueӯ"z+{VSH戮XSTRFγ4@\&6GEgfG 3hzbgeuEk R=;%"仪f|9Ա14ԟ
KwGR ă`e0\ D8'3kHYe[=b#d
mjpg<qaJd1hRf'qeTmv\A^4=Y WVMGɨCWBИ9MQo5 H{A:j4a_:AH"qV<$fĽo+ L#Lc&>Ұ)3E)IQiA"3YG6ok[K+bS%ef,JJ9s92w_;zJxpGv2s^y"BEDr)*,Բ Ύf[)iDjLR[Y~8Y=B`0۳>V}İՊ!&;\1;
dEgڲkO(E K(7b0ъrK)J=vkr~_-( +S
輊( :F
Hy1)h-S d+FMl+ m;1@m*ٱ
սkq_!HY/o
3LPڣTfyl{E,X2vb}fPR鍧VeA+qV}\2&LynUSEWb>srST[T٠vE!
OGS1?//Us^|ս'KXSF9f⥢7&3ʗf[xC&=WQ~QIL