
CUUS063 main CUUS063 Goldreich 978 0 521 88473 0 March 31, 2008 18:49
F.2 . P ROV IN G T H AT IP( f ) ⊆ AM(O( f )) ⊆ AM( f )
1. If both players follow the protocol and N =|S| then the verifier’s output is ε-close to
the uniform distribution over S. Furthermore, the verifier always outputs an element
of S.
2. For any set S
⊆{0, 1}
if the verifier follows the protocol then, no matter how the
prover behaves, the verifier’s output resides in S
with probability at most poly(/ε) ·
(|S
|/N ).
Indeed, the second property is meaningful only for sets S
having size that is (significantly)
smaller than N . We shall be using such a protocol while setting ε to be a constant (say,
ε = 1/2).
A three-message public-coin protocol that satisfies the foregoing properties can
be obtained by using the ideas that underlie Construction 6.32. Specifically, we set
m = max(0, log
2
N − O(log /ε)) in order to guarantee that if |S|=N then, with over-
whelmingly high probability, each of the 2
m
cells defined by a uniformly selected hashing
function contains (1 ± ε) ·|S|/2
m
elements of S. In the protocol, the prover arbitrarily
selects a good hashing function (i.e., one defining such a good partition of S) and sends it
to the verifier, which answers with a uniformly selected cell, to which the prover responds
with a uniformly selected element of S that resides in this cell.
8
We stress that the foregoing protocol is indeed in the public-coin model, and comment
that the fact that it uses three messages rather than two will have a minor effect on our
application (see §F.2.1.3). Indeed, this protocol satisfies the two foregoing properties. In
particular, the second property follows because for every possible hashing function, the
fraction of cells containing an element of S
is at most |S
|/2
m
, which is upper-bounded
by poly(/ε) ·|S
|/N .
F.2.1.3. The Iterated Partition Protocol
Using the random selection protocol of § F.2.1.2, we now present a public-coin emulation
of an arbitrary interactive proof system, (P, V ). We start with some notations.
Fixing any input x to (P, V ), we denote by t = t(|x|) the number of pairs of messages
exchanged in the corresponding interaction, while assuming that the verifier takes the first
move in (P, V ).
9
We denote by = (|x|) the number of coins tossed by V , and assume
that >t. Recall that we assume that P is an optimal prover (with respect to V ), and that
(without loss of generality) P is deterministic. Let us denote by P, V (r)(x) the full tran-
script of the interaction of P and V on input x, when V uses coins r ; that is, P, V (r)(x) =
(α
1
,β
1
,...,α
t
,β
t
,σ)ifσ = V (x, r,β
1
,...,β
t
) ∈{0, 1} is V ’s final verdict and for
every i = 1,...,t it holds that α
i
= V (x, r,β
1
,...,β
i−1
) and β
i
= P(x,α
1
,...,α
i
).
8
We mention that the foregoing protocol is but one of several possible implementations of the ideas that underlie
Construction 6.32. Firstly, note that an alternative implementation may designate the task of selecting a hashing
function to the verifier, who may do so by selecting a function at random. Although this seems more natural, it
actually offers no advantage with respect to the “soundness-like” property (i.e., the second property). Furthermore,
in this case, it may happen (rarely) that the hashing function selected by the verifier is not good, and consequently the
furthermore clause of the first property (i.e., requiring that the output always reside in S) is not satisfied. Secondly,
recall that in the foregoing protocol the last step consists of the prover selecting a random element of S that resides
in the selected (by the verifier) cell. An alternative implementation may replace this step by two steps such that first
the prover sends a list of (1 − ε) · N/2
m
elements (of S) that resides in the said cell, and then the verifier outputs a
uniformly selected element of this list. This alternative yields an improvement in the “soundness-like” property (i.e.,
the verifier’s output resides in S
with probability at most (|S
|/N ) + ε), but requires an additional message (which
we prefer to avoid, although this is not that crucial).
9
We note if the prover takes the first move in (P, V ) then its first message can be emulated with no cost (in the
number of rounds).
575