Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
- 2005
- J. Katz and Y. Lindell.
- In the Journal of Cryptology, 21(3):303-349, 2008. An extended abstract appeared in the 2nd Annual Theory of Cryptography Conference (TCC), Springer-Verlag (LNCS 3378), pages 128-149, 2005.