Examples of Game G2 in a sentence
It follows thatPr[GF0 ⇒ 1] ≤ e2(Qs + 1) Pr[GF1 ⇒ 1] .In Game G2 (see Fig.
In the random oracle model, given a PPT adversary against the SC-IND-CCA2 security of the SCKWC signcryption scheme, there exists a PPT adversary 1 against the GDH problem and a PPT adversary 2 against the OT- IND property of the symmetric encryption scheme such that: AdvSC−IND−CCA2(k) ≤ 2AdvGDH (k)+ AdvOT −IND(k)+0 1Pr[S1] = Pr[S0]⊥⊥∈ { }Game G2: In this game, we replace the signcryption oracle by the signcryption oracle simulator SCSim as described in Figure 3.
Game G2 is the same as game G1 except that we add the following rule: we choose at random two values i0 in [1, n] and c0 in [1, Q].
In the random oracle model, given a PPT adversary A against the SC-UF-CMA property of the pro- posed signcryption scheme, there exists a PPT algorithm BSince (s, r, W ) are independent and uniformly distributed over Z2 × G, the views of attacker in Game G1 and Game G2 are equivalent, as long as the event ⊥SC does not happen.
Game G2 sets bad1 only if A has made some ROA query (xkr, mr, nr) beforehand, such that for the Mr and (m0, m1, xk, n) ← Mr, there are some b ∈ {0, 1} and some i ∈ [|n|] satisfying (xk[i], mb[i], n[i]) = (xk , m , n ).
Since we do not need anymore α, β and C either for the simulation (they were just required in Game G2 for simulating K and the Ki), we are now just given A and B.
Game G2: Password File Attacks/Server CompromiseIn this game we change the simulation to simulate the password file attacks (stealing the password file)without receiving the password file.
If there is an efficient, malicious signer , which is able to distinguish the two games, then we can use it to break the hiding property of C.2In Game G2 the bit b is never used.
Game G2 proceeds as G1 except that it begins by choosingpu, v, wq $ 1, qns 1, qr 2.
Game G2 executes all unmodified lines, all framed lines and all gray lines, which in this case are all four lines.