idealised cryptographic model, where the adversary is only given access to a randomly chosen encoding of a group, (instead of efficient encodings such as those used in practice) including an oracle that executes the group operation
--Agreed Upon Solutions
The discussion does not exist would you like to add the first comment?