Mutually Independent Commitments

نویسنده

  • Shien Jin Ong
چکیده

Computationally binding and perfectly hiding commitments can be constructed from GM-secure public-key encryptions. The main idea is to send an encryption of the message together with the public key. To decommit, we reveal the random bits used to encrypt the message. In fact, one-way functions suffice to construct computationally binding and perfectly hiding commitments. Perfectly binding and computationally hiding commitments can be constructed from claw-free permutations. We present a scheme due to Pederson which relies on the hardness of DLP (the hardness of DLP implies the existence of claw-free permutations). Let S be the sender and R be the receiver. Input: Security parameter, k.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New tools in cryptography: mutually independent commitments, tweakable block ciphers, and plaintext awareness via key registration

Cryptographic primitive research comprises much of the body of modern cryptographic research. This kind of research aims to produce useful primitives – building blocks with which we can design systems to enforce complex and subtle security requirements. Cryptographic primitive research often involves noticing a new problem that needs a simple solution, or a different way of setting up a problem...

متن کامل

Lineage Commitments: Emphasis On Embryonic-Extraembryonic Interfaces.

The EMBO Workshop on 'Lineage Commitments: Emphasis on Embryonic-Extraembryonic Interfaces', held in May 2011, demonstrated that embryonic and extraembryonic tissues play early and significant interacting roles that mutually promote each other's further and correct deployment within the mammalian conceptus. Highlighted here are those presentations that directly addressed embryonic-extraembryoni...

متن کامل

Mutually Independent Commitments

We study the two-party commitment problem, where two players have secret values they wish to commit to each other. Traditional commitment schemes cannot be used here because they do not guarantee independence of the committed values. We present three increasingly strong definitions of independence in this setting and give practical protocols for each. Our work is related to work in non-malleabl...

متن کامل

Timed Commitments

We introduce and construct timed commitment schemes, an extension to the standard notion of commitments in which a potential forced opening phase permits the receiver to recover (with effort) the committed value without the help of the committer. An important application of our timed-commitment scheme is contract signing: two mutually suspicious parties wish to exchange signatures on a contract...

متن کامل

London • Aristotle’s Rhetoric and the Psychology of Practical Ethics

An Aristotelian conception of practical ethics can be derived from the account of practical reasoning that Aristotle articulates in his Rhetoric and this has important implications for the way we understand the nature and limits of practical ethics. An important feature of this conception of practical ethics is its responsiveness to the complex ways in which agents form and maintain moral commi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005