Modifications
This commit is contained in:
		| @@ -281,6 +281,7 @@ This security notion illustrates that no malicious collusions of users and the a | ||||
| The security definition of $\indcpa$ is defined as an indistinguishability game. | ||||
| The first security definition for $\PKE$ was although a simulation-based definition~\cite{GM84}. | ||||
| In this context, instead of distinguishing between two messages, the goal is to distinguish between two different environments. | ||||
| \index{Universal Composability} | ||||
| In the following we will use the \emph{Real world}/\emph{Ideal world} paradigm~\cite{Can01} to describe those different environments. | ||||
| Namely, for $\PKE$, it means that for any $\ppt$ adversary~$\widehat{\adv}$ --\,in the \emph{Real world}\,-- that interacts with a challenger $\cdv$ | ||||
| there exists a $\ppt$ \emph{simulator} $\widehat{\adv}'$ --\,in the \emph{Ideal world}\,-- that interacts with the same challenger $\cdv'$ with the difference that the functionality $F$ is replaced by a trusted third party in the \emph{Ideal word}. | ||||
|   | ||||
		Reference in New Issue
	
	Block a user