Constructions and bounds for unconditionally secure non-interactive commitment schemes

被引:20
|
作者
Blundo, C [1 ]
Masucci, B
Stinson, DR
Wei, R
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON P7B 5E1, Canada
关键词
commitment scheme; resolvable design;
D O I
10.1023/A:1016501125022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Commitment schemes have been extensively studied since they were introduced by Blum in 1982. Rivest recently showed how to construct unconditionally secure non-interactive commitment schemes, assuming the existence of a trusted initializer. In this paper, we present a formal mathematical model for unconditionally secure non-interactive commitment schemes with a trusted initializer and analyze their binding and concealing properties. In particular, we show that such schemes cannot be perfectly binding: there is necessarily a small probability that Alice can cheat Bob by committing to one value but later revealing a different value. We prove several bounds on Alice's cheating probability, and present constructions of schemes that achieve optimal cheating probabilities. We also analyze a class of commitment schemes based on resolvable designs.
引用
收藏
页码:97 / 110
页数:14
相关论文
共 50 条
  • [1] Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes
    C. Blundo
    B. Masucci
    D. R. Stinson
    R. Wei
    Designs, Codes and Cryptography, 2002, 26 : 97 - 110
  • [2] Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
    Blundo, C
    D'Arco, P
    Daza, V
    Padró, C
    THEORETICAL COMPUTER SCIENCE, 2004, 320 (2-3) : 269 - 291
  • [3] A framework for non-interactive instance-dependent commitment schemes (NIC)
    Kapron, Bruce
    Malka, Lior
    Srinivasan, Venkatesh
    THEORETICAL COMPUTER SCIENCE, 2015, 593 : 1 - 15
  • [4] A framework for non-interactive instance-dependent commitment schemes (NIC)
    Kapron, Bruce
    Malka, Lior
    Srinivasan, Venkatesh
    Theoretical Computer Science, 2015, 593 : 1 - 15
  • [5] A framework for non-interactive instance-dependent commitment schemes (NIC)
    Kapron, Bruce
    Malka, Lior
    Srinivasan, Venkatesh
    Theoretical Computer Science, 2015, 593 : 1 - 15
  • [6] Efficient Non-interactive Universally Composable String-Commitment Schemes
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 3 - +
  • [7] Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
    Libert, Benoit
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1405 - 1441
  • [8] Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
    Benoît Libert
    Moti Yung
    Journal of Cryptology, 2020, 33 : 1405 - 1441
  • [9] Unconditionally secure key insulated cryptosystems: Models, bounds and constructions
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 85 - 96
  • [10] An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
    Youn, Taek-Young
    Lee, Changhoon
    Park, Young-Ho
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 353 - 357