{"quality_controlled":"1","date_published":"2014-01-01T00:00:00Z","year":"2014","day":"01","abstract":[{"lang":"eng","text":"Most cryptographic security proofs require showing that two systems are indistinguishable. A central tool in such proofs is that of a game, where winning the game means provoking a certain condition, and it is shown that the two systems considered cannot be distinguished unless this condition is provoked. Upper bounding the probability of winning such a game, i.e., provoking this condition, for an arbitrary strategy is usually hard, except in the special case where the best strategy for winning such a game is known to be non-adaptive. A sufficient criterion for ensuring the optimality of non-adaptive strategies is that of conditional equivalence to a system, a notion introduced in [1]. In this paper, we show that this criterion is not necessary to ensure the optimality of non-adaptive strategies by giving two results of independent interest: 1) the optimality of non-adaptive strategies is not preserved under parallel composition; 2) in contrast, conditional equivalence is preserved under parallel composition."}],"status":"public","date_created":"2018-12-11T11:54:39Z","publication":"IEEE International Symposium on Information Theory","date_updated":"2021-01-12T06:53:59Z","article_number":"6875125","department":[{"_id":"KrPi"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2014/299"}],"author":[{"last_name":"Demay","first_name":"Grégory","full_name":"Demay, Grégory"},{"id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87","last_name":"Gazi","full_name":"Gazi, Peter","first_name":"Peter"},{"full_name":"Maurer, Ueli","first_name":"Ueli","last_name":"Maurer"},{"first_name":"Björn","full_name":"Tackmann, Björn","last_name":"Tackmann"}],"publist_id":"5188","language":[{"iso":"eng"}],"conference":{"start_date":"2014-06-29","location":"Honolulu, USA","end_date":"2014-07-04","name":"IEEE International Symposium on Information Theory Proceedings"},"publication_status":"published","publisher":"IEEE","oa":1,"scopus_import":1,"citation":{"ista":"Demay G, Gazi P, Maurer U, Tackmann B. 2014. Optimality of non-adaptive strategies: The case of parallel games. IEEE International Symposium on Information Theory. IEEE International Symposium on Information Theory Proceedings, 6875125.","ama":"Demay G, Gazi P, Maurer U, Tackmann B. Optimality of non-adaptive strategies: The case of parallel games. In: IEEE International Symposium on Information Theory. IEEE; 2014. doi:10.1109/ISIT.2014.6875125","mla":"Demay, Grégory, et al. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” IEEE International Symposium on Information Theory, 6875125, IEEE, 2014, doi:10.1109/ISIT.2014.6875125.","ieee":"G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Optimality of non-adaptive strategies: The case of parallel games,” in IEEE International Symposium on Information Theory, Honolulu, USA, 2014.","chicago":"Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” In IEEE International Symposium on Information Theory. IEEE, 2014. https://doi.org/10.1109/ISIT.2014.6875125.","short":"G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, IEEE International Symposium on Information Theory, IEEE, 2014.","apa":"Demay, G., Gazi, P., Maurer, U., & Tackmann, B. (2014). Optimality of non-adaptive strategies: The case of parallel games. In IEEE International Symposium on Information Theory. Honolulu, USA: IEEE. https://doi.org/10.1109/ISIT.2014.6875125"},"type":"conference","oa_version":"Submitted Version","month":"01","title":"Optimality of non-adaptive strategies: The case of parallel games","_id":"1907","doi":"10.1109/ISIT.2014.6875125"}