It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existence of non-interactive commitments. Furthermore the construction is black-box (i.e., the underlying one-way function is used as an oracle to implement the commitment scheme, and an adversary attacking the commitment scheme is used as an oracle in the proof of security). We rule out the possibility of black-box constructions of non interactive commitments from general (possibly not one-to-one) one-way functions. As far as we know, this is the first result showing a natural cryptographic task that can be achieved in a black-box way from one-way permutations but not from one-way functions. We next extend our black-box separation to constructio...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
At Eurocrypt 2005 Chase et al. introduced the notion of mercurial commitment schemes. The main appli...
A non-interactive ZK (NIZK) proof enables verification of NP statements without revealing secrets ab...
We propose the first black-box construction of non-malleable commitments according to the standard n...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We present a new non-malleable commitment protocol. Our protocol has the following features: \begin...
Non-malleable commitment is one of the most fundamental cryptographic primitives in that it is often...
Zero-knowledge protocols enable one party, called a prover, to "convince" another party, called a ve...
We show that non-interactive statistically-secret bit commitment cannot be constructed from arbitrar...
We introduce a new notion of one-message zero-knowledge (1ZK) arguments that satisfy a weak soundnes...
The simulation paradigm, introduced by Goldwasser, Micali and Rackoff, is of fundamental importance ...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
How many rounds and which computational assumptions are needed for concurrent non-malleable commitme...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
At Eurocrypt 2005 Chase et al. introduced the notion of mercurial commitment schemes. The main appli...
A non-interactive ZK (NIZK) proof enables verification of NP statements without revealing secrets ab...
We propose the first black-box construction of non-malleable commitments according to the standard n...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We present a new non-malleable commitment protocol. Our protocol has the following features: \begin...
Non-malleable commitment is one of the most fundamental cryptographic primitives in that it is often...
Zero-knowledge protocols enable one party, called a prover, to "convince" another party, called a ve...
We show that non-interactive statistically-secret bit commitment cannot be constructed from arbitrar...
We introduce a new notion of one-message zero-knowledge (1ZK) arguments that satisfy a weak soundnes...
The simulation paradigm, introduced by Goldwasser, Micali and Rackoff, is of fundamental importance ...
How many rounds and which assumptions are required for concurrent non-malleable commitments? The abo...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
How many rounds and which computational assumptions are needed for concurrent non-malleable commitme...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
At Eurocrypt 2005 Chase et al. introduced the notion of mercurial commitment schemes. The main appli...
A non-interactive ZK (NIZK) proof enables verification of NP statements without revealing secrets ab...