Game G2 definition
Examples of Game G2 in a sentence
The Base Order also gave the FMV an option to make additional purchases at any time through June 30, 2010.
Game G2 sets bad1 only if A has made some ROA query (xkr, mr, nr) beforehand, such that for the Mr and (m0, m1, xk, n) ← Mr, there are some b ∈ {0, 1} and some i ∈ [|n|] satisfying (xk[i], mb[i], n[i]) = (xk , m , n ).
Game G2 is the same as game G1 except that we add the following rule: we choose at random two values i0 in [1, n] and c0 in [1, Q].
In the random oracle model, given a PPT adversary against the SC-IND-CCA2 security of the SCKWC signcryption scheme, there exists a PPT adversary 1 against the GDH problem and a PPT adversary 2 against the OT- IND property of the symmetric encryption scheme such that: AdvSC−IND−CCA2(k) ≤ 2AdvGDH (k)+ AdvOT −IND(k)+0 1Pr[S1] = Pr[S0]⊥⊥∈ { }Game G2: In this game, we replace the signcryption oracle by the signcryption oracle simulator SCSim as described in Figure 3.
Since we do not need anymore α, β and C either for the simulation (they were just required in Game G2 for simulating K and the Ki), we are now just given A and B.
In the random oracle model, given a PPT adversary A against the SC-UF-CMA property of the pro- posed signcryption scheme, there exists a PPT algorithm BSince (s, r, W ) are independent and uniformly distributed over Z2 × G, the views of attacker in Game G1 and Game G2 are equivalent, as long as the event ⊥SC does not happen.
Game G2: Let pj , sst , A , B , O , pΛ ,i, Λ ,i.tqn q be the guess of the adversary.
Since A learns ρi∗ only in theattack-ed session (as observed in Game G2) and having excluded PRF collisions and random guesses the∗iprobability that A is able to influence Πs computing Ri∗+1 in the attack stage is bound by the probabilityowAA ⊕that in the attack-ed session computes the appropriate nonce ri∗+1 such that π(ri∗+1) = Ri∗+1 ρi∗ holds.
If b = 1, then it follows by the context hiding property of Σ′ that Adv(G1,Q) ≥ Adv(G0) − Q · Advch(λ).Hybrid Game G2.
If there is an efficient, malicious signer , which is able to distinguish the two games, then we can use it to break the hiding property of C.2In Game G2 the bit b is never used.