11

What are the minimal components to build a security model proof for a protocol?

This question might seem trivial, but having read many papers-- from the IEEE, ACM, etc., that talk about a KMP-- I still don't know where to start. For example, should I use the adversary model or a random oracle?

Patriot
  • 3,162
  • 3
  • 20
  • 66
CipherX
  • 381
  • 3
  • 12

0 Answers0