Abstract. We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge of the contents of commitments and for verifying multiplicative relations over the integers on committed values. The scheme can be seen as a generalization, with a slight modification, of the earlier scheme of Fujisaki and Okamoto [14]. The reasons we revisit the earlier scheme and give some modification to it are as follows: – The earlier scheme [14] has some gaps in the proof of soundness of the associated protocols, one of which presen...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
International audienceCommitting integers and proving relations between them is an essential ingredi...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
We demonstrate the cryptographic usefulness of a small subgroup of Z # n of hidden order. Cryptogra...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables ...
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
Commitment schemes are important tools in cryptography and used as building blocks in many cryptogra...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Abstract. Commitment schemes are among cryptography’s most im-portant building blocks. Besides their...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
International audienceCommitting integers and proving relations between them is an essential ingredi...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
We demonstrate the cryptographic usefulness of a small subgroup of Z # n of hidden order. Cryptogra...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables ...
We give a construction of statistically hiding commitment schemes (those in which the hiding propert...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
Commitment schemes are important tools in cryptography and used as building blocks in many cryptogra...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Abstract. Commitment schemes are among cryptography’s most im-portant building blocks. Besides their...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...