Vector Commitments and Their Applications

被引:0
作者
Catalano, Dario [1 ]
Fiore, Dario [2 ,3 ]
机构
[1] Univ Catania, Dipartimento Matemat & Informat, Catania, Italy
[2] Max Planck Inst Software Syst MPI SWS, Kaiserslautern, Germany
[3] NYU, New York, NY 10003 USA
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013 | 2013年 / 7778卷
关键词
ZERO-KNOWLEDGE SETS; MERCURIAL COMMITMENTS; EFFICIENT REVOCATION; ACCUMULATORS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We put forward the study of a new primitive that we call Vector Commitment (VC, for short). Informally, VCs allow to commit to an ordered sequence of q values (m(1), ... , m(q)) in such a way that one can later open the commitment at specific positions (e.g., prove that m(i) is the i-th committed message). For security, Vector Commitments are required to satisfy a notion that we call position binding which states that an adversary should not be able to open a commitment to two different values at the same position. Moreover, what makes our primitive interesting is that we require VCs to be concise, i.e. the size of the commitment string and of its openings has to be independent of the vector length. We show two realizations of VCs based on standard and well established assumptions, such as RSA, and Computational Diffie-Hellman (in bilinear groups). Next, we turn our attention to applications and we show that Vector Commitments are useful in a variety of contexts, as they allow for compact and efficient solutions which significantly improve previous works either in terms of efficiency of the resulting solutions, or in terms of "quality" of the underlying assumption, or both. These applications include: Verifiable Databases with Efficient Updates, Updatable Zero-Knowledge Databases, and Universal Dynamic Accumulators.
引用
收藏
页码:55 / 72
页数:18
相关论文
共 30 条
  • [1] [Anonymous], USENIX SECURITY
  • [2] [Anonymous], A MEND WORKSH FDN DA
  • [3] Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
  • [4] Bellare M., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P163
  • [5] Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
  • [6] Benaloh J., 1994, Lecture Notes in Computer Science 765: Advances in Cryptology (EUROCRYPT'93), P274
  • [7] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
  • [8] Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
  • [9] Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P481
  • [10] Catalano D., 2011, CRYPTOLOGY EPRINT AR