Can someone teach me how to understand the paper: [https://eprint.iacr.org/2017/1050.pdf] Chapter 5 Security Proof