What are the minimal components to build a security model proof for a protocol?
This question might seem trivial, but having read many papers-- from the IEEE, ACM, etc., that talk about a KMP-- I still don't know where to start. For example, should I use the adversary model or a random oracle?