Donald Samuels, Ian Stobert
SPIE Photomask Technology + EUV Lithography 2007
Goldwasser and Sipser proved that every inter-active proof system can be transformed into a public-coin one (a.k.a. an Arthur-Merlin game), Unfortunately, the applicability of their transformation to cryptography is limited because it does not preserve the computational complexity of the prover's strategy. Vadhan showed that this deficiency is inherent by constructing a promise problem II with a private-coin interactive proof that cannot be transformed into an Arthur-Merlin game such that the new prover can be implemented in polynomial-time with oracle access to the original prover [34], However, the transformation formulated by Vadhan has a restriction, i.e., it does not allow the new prover and verifier to look at common input. This restriction is essential for the proof of Vadhan's negative result. This paper considers an unrestricted transformation where both the new prover and verifier are allowed to access and analyze common input. We show that an analogous negative result holds even in this unrestricted case under a non-standard computational assumption.
Donald Samuels, Ian Stobert
SPIE Photomask Technology + EUV Lithography 2007
Ehud Altman, Kenneth R. Brown, et al.
PRX Quantum
David W. Jacobs, Daphna Weinshall, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence
F.M. Schellenberg, M. Levenson, et al.
BACUS Symposium on Photomask Technology and Management 1991