期刊文献+

The Multireceiver Commitment Schemes

The Multireceiver Commitment Schemes
原文传递
导出
摘要 Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisticate commitment schemes. In this paper, we study for the first time multireceiver commitment in unconditionally secure setting, i.e., one committer promises a group of verifiers a common secret value (in computational setting it is trivial). We extend the Rivest model for this purpose and present a provably secure generic construction using multireceiver authentication codes (without secrecy) as building blocks. Two concrete schemes are proposed as its immediate implementations, which are almost as efficient as an optimal MRA-code. We believe using other primitives to construct variants of this concept will open doors for more interesting research. Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisticate commitment schemes. In this paper, we study for the first time multireceiver commitment in unconditionally secure setting, i.e., one committer promises a group of verifiers a common secret value (in computational setting it is trivial). We extend the Rivest model for this purpose and present a provably secure generic construction using multireceiver authentication codes (without secrecy) as building blocks. Two concrete schemes are proposed as its immediate implementations, which are almost as efficient as an optimal MRA-code. We believe using other primitives to construct variants of this concept will open doors for more interesting research.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期759-764,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the Foundation of Development and Reform Commission of China under Grant High-Tech ([2007] 2367)
关键词 commitment scheme multi-party computation unconditional security authentication code verifiable secret sharing commitment scheme multi-party computation unconditional security authentication code verifiable secret sharing
  • 相关文献

参考文献11

  • 1C. Blundo,B. Masucci,D. R. Stinson,R. Wei.Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes[J].Designs Codes and Cryptography (-).2002(1-3)
  • 2Blum M.Coin Flipping by Telephone—A Protocol for Solving Impossible Problems[].Proceedings of COMPCON.1982
  • 3Rivest R L.Unconditionally Secure Commitment and Oblivi- ous Transfer Schemes Using Private Channels and a Trusted Initializer [R/OL]. http://citeseer.ifi.unizh.ch/ rivest99unconditionally.html/ . 2007
  • 4Blundo C,Masucci B,Douglas R S, et al.Constructions and Bounds for Unconditionally Secure Non-Interactive Com- mitment Schemes[].Design Codes and Cryptography.2002
  • 5Pinto A,Souto A,Matos A, et al.Galois Field Commitment Scheme [R/OL]. http://eprint.iacr.org/ . 2007
  • 6Ostrovsky R,Venkatesan R,Yung Moti.Secure Commitment against a Powerful Adversary[].Proceedings of STACS: (LNCS ).1992
  • 7Damgard I,Kilian J,Salvail L.On the (im)Possibility of Bas- ing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions[].Proceedings of EUROCRYPT (LNCS ).1999
  • 8Agarwal S,Cramer R,de Haan R.Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.[].Proceedings of CRYPTO (LNCS ).2006
  • 9Kurosawa K,Obana S.Characterisation of (k, n) Multi-Re- ceiver Authentication[].Proceedings of ACISP (LNCS ).1997
  • 10Desmedt Y,Frankel Y,Yung M.Multi-Receiver/Multi- Sender Network Security: Efficient Authenticated Multi- cast/Feedback[].Proceedings of INFOCOM Eleventh An- nual Joint Conference of the IEEE Computer and Communi- cations Societies.1992

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部