We present a new non-malleable commitment protocol. Our protocol has the following features: \begin​{itemize} \item The protocol has only \emph{three rounds} of interaction. Pass (TCC 2013) showed an impossibility result for a two-round non-malleable commitment scheme w.r.t. a black-box reduction to any ``standard intractability reduction. Thus, this resolves the round complexity of non-malleable commitment at least w.r.t. black-box security reductions. Our construction is secure as per the standard notion of non-malleability w.r.t. commitment. \item Our protocol is \emph{truly efficient}. In our basic protocol, the entire computation of the committer is dominated by just three invocations of a non-interactive statically binding co...
Two main goals of modern cryptography are to identify the minimal assumptions necessary to construct...
One of the central questions in Cryptography is the design of round-efficient protocols that are sec...
It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existen...
We present a new non-malleable commitment protocol. Our protocol has the following features: • The p...
Non-malleable commitment is one of the most fundamental cryptographic primitives in that it is often...
We propose the first black-box construction of non-malleable commitments according to the standard n...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
We present efficient non-malleable commitment schemes based on standard assumptions such as RSA and ...
Non-malleable commitments are a central cryptographic primitive that guarantee security against man-...
How many rounds and which computational assumptions are needed for concurrent non-malleable commitme...
We obtain a black-box construction of non-interactive CCA commitments against non-uniform adversarie...
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the foc...
We show unconditionally that the existence of commitment schemes implies the existence of constant-r...
Non-malleable cryptography, proposed by Dolev, Dwork, and Naor (SICOMP \u2700), has numerous applica...
Abstract We introduce the notion of multi-trapdoor commitments which is a stronger form of trapdoorc...
Two main goals of modern cryptography are to identify the minimal assumptions necessary to construct...
One of the central questions in Cryptography is the design of round-efficient protocols that are sec...
It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existen...
We present a new non-malleable commitment protocol. Our protocol has the following features: • The p...
Non-malleable commitment is one of the most fundamental cryptographic primitives in that it is often...
We propose the first black-box construction of non-malleable commitments according to the standard n...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
We present efficient non-malleable commitment schemes based on standard assumptions such as RSA and ...
Non-malleable commitments are a central cryptographic primitive that guarantee security against man-...
How many rounds and which computational assumptions are needed for concurrent non-malleable commitme...
We obtain a black-box construction of non-interactive CCA commitments against non-uniform adversarie...
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the foc...
We show unconditionally that the existence of commitment schemes implies the existence of constant-r...
Non-malleable cryptography, proposed by Dolev, Dwork, and Naor (SICOMP \u2700), has numerous applica...
Abstract We introduce the notion of multi-trapdoor commitments which is a stronger form of trapdoorc...
Two main goals of modern cryptography are to identify the minimal assumptions necessary to construct...
One of the central questions in Cryptography is the design of round-efficient protocols that are sec...
It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existen...