0

Recently reading about CPA, CCA safety security proof. After reading a few papers, the author is in the process of proof. The challenger maintains some lists. I really don’t understand why the challenger wants to maintain some lists, and some of the following steps need to check the list, and some do not need to check?

For example, the security proof of this paper (Thm. phase1) https://ieeexplore.ieee.org/document/8662560

Hung LI
  • 31
  • 1
  • Interesting question, but it could be enhanced by providing more details about where the lists are introduced and your own thoughts about it. – Maarten Bodewes Apr 15 '21 at 21:34
  • Would this be your answer at https://crypto.stackexchange.com/a/72662/82720? – Cloud Cho Apr 17 '21 at 06:36
  • @CloudCho Thank you for your answer, but it seems not. I want to know why the challenger maintains some lists or table on the paper. What is the intention? – Hung LI Apr 22 '21 at 05:42
  • @MaartenBodewes It is currently speculated to maintain the consistency of the query – Hung LI Apr 22 '21 at 05:46

0 Answers0