Abstract. We present a lower bound on the round complexity of a natural class of black-box constructions of statistically hiding commitments from one-way permutations. This implies a Ω ( n logn) lower bound on the round complexity of a computational form of interactive hashing, which has been used to construct statistically hiding commitments (and related primitives) from various classes of one-way functions, starting with the work of Naor, Ostrovsky, Venkatesan and Yung (J. Cryptology, 1998). Our lower bound matches the round complexity of the protocol studied by Naor et al
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
We study the round and communication complexities of various cryptographic protocols. We give tight ...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Interactive hashing, introduced by Naor et al. [NOVY98], plays an important role in many crypto-grap...
We consider the round complexity of multi-party computation in the presence of a static adversary wh...
In this work we continue the study on the round complexity of secure two-party computation with blac...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
We study the round and communication complexities of various cryptographic protocols. We give tight ...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Interactive hashing, introduced by Naor et al. [NOVY98], plays an important role in many crypto-grap...
We consider the round complexity of multi-party computation in the presence of a static adversary wh...
In this work we continue the study on the round complexity of secure two-party computation with blac...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...