Info-Commit: Information-Theoretic Polynomial Commitment

نویسندگان

چکیده

We introduce Info-Commit , an information-theoretic protocol for polynomial commitment and verification. With the help of a trusted initializer, succinct to private $f$ is provided user. The user then queries server obtain evaluations at several inputs chosen by provides along with proofs correctness which can verify against initial commitment. has four main features. Firstly, able detect, high probability, if responded same initially committed to. Secondly, rigorous privacy guarantees server: upon observing response notation="LaTeX">$m$ evaluation queries, only learns notation="LaTeX">$O(m^{2})$ symbols about coefficients . Thirdly, verifiability are unconditional regardless computational power two parties. Lastly, doubly-efficient in sense that phase, runs notation="LaTeX">$O(\sqrt {d})$ time notation="LaTeX">$O(d)$ time, where notation="LaTeX">$d-1$ degree

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Theoretic Security for Bit Commitment

Higo, Tanaka, Yamada, and Yasunaga (ACISP 2012) studied oblivious transfer (OT) from a game-theoretic viewpoint in the malicious model. Their work can be considered as an extension of the study on two-party computation in the fail-stop model by Asharov, Canetti, and Hazay (EUROCRYPT 2011). This paper focuses on bit commitment, and continues to study it from a perspective of game theory. In a si...

متن کامل

Some Info on Info Theory

Understanding causal relationships, oreffective connectivity, between parts of the brain is ofutmost importance because a large part of the brain’sactivity is thought to be internally generated and,hence, quantifying stimulus response relationshipsalone does not fully describe brain dynamics. Pastefforts to determine effective connectivity mostly reliedon model based...

متن کامل

An Information-Theoretic Perspective on the Quantum Bit Commitment Impossibility Theorem

This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers’ no-go theorem is constructed. We have adopted the tools of quantum entropy analysis to investigate the conditions under which the security properties of quantum bit commitment can be cir...

متن کامل

Recognizing Graph Theoretic Properties with Polynomial Ideals

Many hard combinatorial problems can be modeled by a system of polynomial equations. N. Alon coined the term polynomial method to describe the use of nonlinear polynomials when solving combinatorial problems. We continue the exploration of the polynomial method and show how the algorithmic theory of polynomial ideals can be used to detect k-colorability, unique Hamiltonicity, and automorphism r...

متن کامل

HCFA's Consumer Information Commitment

This article provides examples of how the Health Care Financing Administration is providing Medicare and Medicaid beneficiaries with information that will allow them to become more active participants in decisions affecting their health and well-being. The article emphasizes how HCFA has incorporated a beneficiary-centered focus and social marketing techniques in its consumer information activi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2022

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2022.3163581