In several security games, it is safe to replace probabilistic polynomial-time adversaries with deterministic ones without reducing the adversarial advantage. The relevant argument can be found here.
However, according to Bellare&Goldreich, the argument of fixing coins that maximize success probability fails in a proof-of-knowledge context where extraction procedures arise.
On the other hand, the authors claim that their paper bridges the gap between two classical formulations involving probabilistic and deterministic adversaries respectively.
Does their result mean that we can still confine ourselves to deterministic adversaries in a proof-of-knowledge context without reducing the adversarial advantage? This seems to be so, but i'm not able to follow their argument in detail. Thanks.