On the existence of statistically hiding bit commitment schemes and fail-stop signatures

被引:0
|
作者
Ivan B. Damgård
Torben P. Pedersen
Birgit Pfitzmann
机构
[1] Aarhus University,Matematisk Institut, BRiCS
[2] Cryptomathic,Institut für Informatik
[3] Universität Hildesheim,undefined
来源
Journal of Cryptology | 1997年 / 10卷
关键词
Bit commitments; Fail-stop signatures; Digital signatures; Protocols; Zero-knowledge; Collision intractable hash functions; Privacy amplification;
D O I
暂无
中图分类号
学科分类号
摘要
We show that the existence of a statistically hiding bit commitment scheme with noninteractive opening and public verifiability implies the existence of fail-stop signatures. Therefore such signatures can now be based on any one-way permutation. We also show that genuinely practical fail-stop signatures follow from the existence of any collision-intractable hash function. These are the weakest assumptions known to be sufficient for fail-stop signatures.
引用
收藏
页码:163 / 194
页数:31
相关论文
共 15 条
  • [1] On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    Damgard, IB
    Pedersen, TP
    Pfitzmann, B
    JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 163 - 194
  • [2] Fail-stop signatures
    Pedersen, TP
    Pfitzmann, B
    SIAM JOURNAL ON COMPUTING, 1997, 26 (02) : 291 - 330
  • [3] On the security for the fail-stop digital signatures
    Zhang, QH
    Zheng, JM
    Yang, CD
    WAVELET ANALYSIS AND ITS APPLICATIONS (WAA), VOLS 1 AND 2, 2003, : 814 - 820
  • [4] Extremely Simple Fail-Stop ECDSA Signatures
    Yaksetig, Mario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 230 - 234
  • [5] Fail-stop verifiable secret sharing schemes
    Susilo, W
    Mu, Y
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 663 - 667
  • [6] How to construct fail-stop confirmer signature schemes
    Safavi-Naini, R
    Susilo, W
    Wang, HX
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 435 - 444
  • [7] Efficient Fail-Stop Signatures from the Factoring Assumption
    Mashatan, Atefeh
    Ouafi, Khaled
    INFORMATION SECURITY, 2011, 7001 : 372 - 385
  • [8] Factorization-based fail-stop signatures revisited
    Schmidt-Samoa, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 118 - 131
  • [9] Constructions of Fail-Stop Signatures for Multi-Signer Setting
    Kitajima, Nobuaki
    Yanai, Naoto
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 112 - 123
  • [10] On Fail-Stop Signature Schemes with H-EUC Security
    Nomura, Masahiro
    Nakamura, Katsuhiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01) : 125 - 147