Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions
نویسندگان
چکیده
We present a constant-round non-malleable commitment scheme based on the existence of sub-exponential one-way functions and using a blackbox proof of security. As far as we know, this is the first construction of a constant-round non-malleable protocol based on only one-wayness, or to admit a black-box proof of security under any standard-type assumption.
منابع مشابه
Black-Box Constructions of Two-Party Protocols from One-Way Functions
We exhibit constructions of the following two-party cryptographic protocols given only black-box access to a one-way function: – constant-round zero-knowledge arguments (of knowledge) for any language in NP; – constant-round trapdoor commitment schemes; – constant-round parallel coin-tossing. Previous constructions either require stronger computational assumptions (e.g. collision-resistant hash...
متن کاملConcurrent Non-Malleable Commitments (and More) in 3 Rounds
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the focus of extensive research for about 25 years. The recent breakthrough of Goyal, Pandey and Richelson [STOC 2016] showed that 3 rounds are sufficient for (one-left, one-right) non-malleable commitments. This result matches a lower bound of [Pas13]. The state of affairs leaves still open the intrigu...
متن کامل4-Round Concurrent Non-Malleable Commitments from One-Way Functions
How many rounds and which computational assumptions are needed for concurrent nonmalleable commitments? The above question has puzzled researchers for several years. Recently, Pass in [TCC 2013] proved a lower bound of 3 rounds when security is proven through black-box reductions to falsifiable assumptions. On the other side, positive results of Goyal [STOC 2011], Lin and Pass [STOC 2011] and G...
متن کاملFour-Round Concurrent Non-Malleable Commitments from One-Way Functions
How many rounds and which computational assumptions are needed for concurrent nonmalleable commitments? The above question has puzzled researchers for several years. Recently, Pass in [TCC 2013] proved a lower bound of 3 rounds when security is proven through black-box reductions to falsifiable assumptions. On the other side, positive results of Goyal [STOC 2011], Lin and Pass [STOC 2011] and G...
متن کاملLectures 3-4 - Non-Malleable Protocols
We consider the execution of two-party protocols in the presence of an adversary that has full control of the communication channel between the parties. The adversary has the power to omit, insert or modify messages at its choice. It has also full control over the scheduling of the messages. The honest parties are not necessarily aware to the existence of the adversary, and are not allowed to u...
متن کامل