Concurrent non-malleable commitments

被引:73
作者
Pass, R [1 ]
Rosen, A [1 ]
机构
[1] MIT, CSAIL, Cambridge, MA 02139 USA
来源
46TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 2005年
关键词
D O I
10.1109/SFCS.2005.27
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a non-malleable commitment scheme that retains its security properties even when concurrently executed a polynomial number of times. That is, a man-in-the-middle adversary who is simultaneously participating in multiple concurrent commitment phases of our scheme, both as a sender and as a receiver cannot make the values he commits to depend on the values he receives commitments to. Our result is achieved without assuming an a-priori bound on the number of executions and without relying on any set-up assumptions. Our construction relies on the existence of standard collision resistant hash functions and only requires a constant number of communication rounds.
引用
收藏
页码:563 / 572
页数:10
相关论文
共 50 条
  • [31] Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
    Rafael Pass
    computational complexity, 2016, 25 : 607 - 666
  • [32] Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
    Pass, Rafael
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 334 - 354
  • [33] Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge
    Ostrovsky, Rafail
    Pandey, Omkant
    Visconti, Ivan
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 535 - +
  • [34] On constant-round concurrent non-malleable proof systems
    Cao, Zhenfu
    Visconti, Ivan
    Zhang, Zongyang
    INFORMATION PROCESSING LETTERS, 2011, 111 (18) : 883 - 890
  • [35] Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
    Li, Xin
    34TH COMPUTATIONAL COMPLEXITY CONFERENCE (CCC 2019), 2019, 137
  • [36] Non-Malleable Codes
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    Wichs, Daniel
    JOURNAL OF THE ACM, 2018, 65 (04)
  • [37] Non-malleable Obfuscation
    Canetti, Ran
    Varia, Mayank
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 73 - +
  • [38] Improved Non-malleable Extractors, Non-malleable Codes and Independent Source Extractors
    Li, Xin
    STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 1144 - 1156
  • [39] An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
    Arita, Seiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 367 - 382
  • [40] Efficient ID-based non-malleable trapdoor commitments based on RSA and factoring
    Wu, Chunhui
    Li, Qin
    Long, Dongyang
    Journal of Communications, 2015, 10 (05): : 330 - 338