An execution of Cryptographic Protocolπ with environment ϵ and adversary A on initial input z
Begins by running ϵ on z
Machines take turns
When μ=(ID,c,μ~) executes “transmit to ID′”, μ is suspended
Then:
If μ=ϵ, message written to μ′ on the input tape with sender as some external entity, then, μ′ runs (Environment gives input to Protocol)
if μ=ϵ, and the destination ID′ is external, the message is written to ϵ‘s output tape with ID and ID’ and ϵ runs. (Protocol or adversary gives output to environment)
Otherwise, the message is written to μ′ with the given tape that the machine specifies and the ID then μ′ runs. (Cryptographic Machine gives message to other machine in the Protocol)