Common use of Roadmap Clause in Contracts

Roadmap. Lemma 4.3 is proved in a straightforward way (hence omitted), given the random nature of the oracles. The proof of Lemma 4.4 is the main technical bulk of our paper, consisting of the description of an attacker and attack analysis. We first describe the attacker for the case (Initg, Comme, Derived) in Section 4.2, and will then describe an attack against general construc- tions in Appendix C. Lemma 4.4 will follow similarly from the below simpler attack. We may now obtain the following from Lemmas 4.3,4.4, proved via standard black-box separation techniques.

Appears in 2 contracts

Sources: Continuous Group Key Agreement (Cgka) Protocols, Research Paper

Roadmap. Lemma 4.3 is proved in a straightforward way (hence omitted), given the random nature of the oracles. The proof of Lemma 4.4 is the main technical bulk of our paper, consisting of the description of an attacker and attack analysis. We first describe the attacker for the case (Initg, Comme, Derived) in Section 4.2, and will then describe an attack against general construc- tions in Appendix Section C. Lemma 4.4 4.3 will then follow similarly from the below simpler attackLemma 4.20. We may now obtain the following from Lemmas 4.3,4.4, proved via standard black-box separation techniques.

Appears in 1 contract

Sources: Research Paper