Info-Commit: Information-Theoretic Polynomial Commitment
نویسندگان
چکیده
We introduce Info-Commit , an information-theoretic protocol for polynomial commitment and verification. With the help of a trusted initializer, succinct to private $f$ is provided user. The user then queries server obtain evaluations at several inputs chosen by provides along with proofs correctness which can verify against initial commitment. has four main features. Firstly, able detect, high probability, if responded same initially committed to. Secondly, rigorous privacy guarantees server: upon observing response notation="LaTeX">$m$ evaluation queries, only learns notation="LaTeX">$O(m^{2})$ symbols about coefficients . Thirdly, verifiability are unconditional regardless computational power two parties. Lastly, doubly-efficient in sense that phase, runs notation="LaTeX">$O(\sqrt {d})$ time notation="LaTeX">$O(d)$ time, where notation="LaTeX">$d-1$ degree
منابع مشابه
Game-Theoretic Security for Bit Commitment
Higo, Tanaka, Yamada, and Yasunaga (ACISP 2012) studied oblivious transfer (OT) from a game-theoretic viewpoint in the malicious model. Their work can be considered as an extension of the study on two-party computation in the fail-stop model by Asharov, Canetti, and Hazay (EUROCRYPT 2011). This paper focuses on bit commitment, and continues to study it from a perspective of game theory. In a si...
متن کاملSome Info on Info Theory
Understanding causal relationships, oreffective connectivity, between parts of the brain is ofutmost importance because a large part of the brain’sactivity is thought to be internally generated and,hence, quantifying stimulus response relationshipsalone does not fully describe brain dynamics. Pastefforts to determine effective connectivity mostly reliedon model based...
متن کاملAn Information-Theoretic Perspective on the Quantum Bit Commitment Impossibility Theorem
This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers’ no-go theorem is constructed. We have adopted the tools of quantum entropy analysis to investigate the conditions under which the security properties of quantum bit commitment can be cir...
متن کاملRecognizing Graph Theoretic Properties with Polynomial Ideals
Many hard combinatorial problems can be modeled by a system of polynomial equations. N. Alon coined the term polynomial method to describe the use of nonlinear polynomials when solving combinatorial problems. We continue the exploration of the polynomial method and show how the algorithmic theory of polynomial ideals can be used to detect k-colorability, unique Hamiltonicity, and automorphism r...
متن کاملHCFA's Consumer Information Commitment
This article provides examples of how the Health Care Financing Administration is providing Medicare and Medicaid beneficiaries with information that will allow them to become more active participants in decisions affecting their health and well-being. The article emphasizes how HCFA has incorporated a beneficiary-centered focus and social marketing techniques in its consumer information activi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2022
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2022.3163581