Abstract. It is known that composable secure commitments, that is, concurrent non-malleable com-mitments exist in the plain model, based only on standard assumptions such as the existence of claw-free permutations or even one-way functions. Since being based on the plain model, the deniability of them is trivially satisfied, and especially the latter scheme satisfies also adaptivity, hence it is adaptive-deniable-concurrent non-malleable. However, those schemes cannot be said to be practically efficient. We show a practically efficient (string) adaptive-deniable-concurrent commitment scheme is possible under a global setup model, called global CRS-KR model
We present a new non-malleable commitment protocol. Our protocol has the following features: • The p...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
We present efficient non-malleable commitment schemes based on standard assumptions such as RSA and ...
We show unconditionally that the existence of commitment schemes implies the existence of constant-r...
We show \emph{unconditionally} that the existence of commitment schemes implies the existence of \em...
We present the first provably secure constructions of universally composable (UC) commitments (in pa...
We present the first provably secure constructions of universally composable (UC) commitments (in pa...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
Abstract. Under the assumption of the existence of one-way functions, we prove that it is possible t...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the foc...
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the foc...
Abstract. We propose a new security measure for commitment pro-tocols, called Universally Composable...
We present a new non-malleable commitment protocol. Our protocol has the following features: • The p...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
We present efficient non-malleable commitment schemes based on standard assumptions such as RSA and ...
We show unconditionally that the existence of commitment schemes implies the existence of constant-r...
We show \emph{unconditionally} that the existence of commitment schemes implies the existence of \em...
We present the first provably secure constructions of universally composable (UC) commitments (in pa...
We present the first provably secure constructions of universally composable (UC) commitments (in pa...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
Abstract. Under the assumption of the existence of one-way functions, we prove that it is possible t...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the foc...
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the foc...
Abstract. We propose a new security measure for commitment pro-tocols, called Universally Composable...
We present a new non-malleable commitment protocol. Our protocol has the following features: • The p...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
We present efficient non-malleable commitment schemes based on standard assumptions such as RSA and ...