Determining the minimal assumptions needed to construct various cryptographic building blocks has been a focal point of research in theoretical cryptography. For most — but not all! — cryptographic primitives, complexity assumptions both necessary and sufficient for their existence are known. Here, we revisit the following, decade-old question: what are the minimal assumptions needed to construct a statistically-hiding bit commitment scheme? Previously, it was known how to construct such schemes based on any one-way permutation. In this work, we show that regular one-way functions suffice. We show two constructions of statistically-hiding commitment schemes from regular one-way functions. Our first construction is more direct, and serves a...
We study the round and communication complexities of various cryptographic protocols. We give tight ...
Abstract. We present a statistically-hiding commitment scheme allowing commitment to arbitrary size ...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
In this paper we show how to convert a statistically bindingbut computationally concealing quantum b...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
We show that non-interactive statistically-secret bit commitment cannot be constructed from arbitrar...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Abstract. In this paper we show how to convert a statistically binding but computationally concealin...
We study the round and communication complexities of various cryptographic protocols. We give tight ...
Abstract. We present a statistically-hiding commitment scheme allowing commitment to arbitrary size ...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
In this paper we show how to convert a statistically bindingbut computationally concealing quantum b...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
We show that non-interactive statistically-secret bit commitment cannot be constructed from arbitrar...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Abstract. In this paper we show how to convert a statistically binding but computationally concealin...
We study the round and communication complexities of various cryptographic protocols. We give tight ...
Abstract. We present a statistically-hiding commitment scheme allowing commitment to arbitrary size ...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...