On Expected Probabilistic PolynomialTime Adversaries 
A suggestion for restricted definitions and their benefits
Webpage for a paper by Oded Goldreich
Abstract
This paper concerns the possibility of developing a coherent
theory of security when feasibility is associated
with expected probabilistic polynomialtime (expected PPT).
The source of difficulty is that
the known definitions of expected PPT strategies
(i.e., expected PPT interactive machines)
do not support natural results of the type presented below.
To overcome this difficulty,
we suggest new definitions of expected PPT strategies,
which are more restrictive than the known definitions
(but nevertheless
extend the notion of expected PPT noninteractive algorithms).
We advocate the conceptual adequacy of these definitions,
and point out their technical advantages.
Specifically, identifying a natural subclass of blackbox simulators,
called normal, we prove the following two results:

Security proofs that refer to all strict PPT adversaries
(and are proven via normal blackbox simulators), extend to
provide security with respect to all adversaries that satisfy
the restricted definitions of expected PPT.

Security composition theorems of the type known for strict PPT
hold for these restricted definitions of expected PPT,
where security means simulation by normal blackbox simulators.
Specifically, a normal blackbox simulator is required
to make an expected polynomial number of steps,
when given oracle access to any strategy,
where each oracle call is counted as a single step.
This natural property is satisfies by most known simulators
and is easy to verify.
Material available online
Back to
either Oded Goldreich's homepage.
or general list of papers.