: An interactive experiment between the adversary and the simulator . Based on the leakage functions and , the simulator generates a simulated and and sends them to the adversary . The adversary can make polynomial-time adaptive queries to the simulator . For each query, the simulator can access the leakage function and return the corresponding simulated query token . Finally, the adversary returns a bit b as the output of the experiment.
|