We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations, and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as single-server private information retrieval, interactive hashing, and oblivious transfer that guarantees statistical security for one of the parties. Our techniques extend the collision-finding oracle due to Simon (EUROCRYPT ’98) to the setting of interactive protocols and the reconstruction paradigm of Gennaro and Trevisan (FOCS ’00)
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a c...
The celebrated Fiat-Shamir transformation turns any public-coin interactive proof into a non-interac...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
In this work we continue the study on the round complexity of secure two-party computation with blac...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Abstract. Essentially all work studying the round complexity of secure computation assume broadcast ...
We consider the round complexity of multi-party computation in the presence of a static adversary wh...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a c...
The celebrated Fiat-Shamir transformation turns any public-coin interactive proof into a non-interac...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
In this work we continue the study on the round complexity of secure two-party computation with blac...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Abstract. Essentially all work studying the round complexity of secure computation assume broadcast ...
We consider the round complexity of multi-party computation in the presence of a static adversary wh...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a c...
The celebrated Fiat-Shamir transformation turns any public-coin interactive proof into a non-interac...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...