114 Bit Commitment Using Hash Functions
نویسنده
چکیده
The purpose of r2 is to protect Alice’s secret bit b. To find b before Alice opens the commitment, Bob would have to find r′ 2 and b ′ such that H(r1r 2b ′) = c. This is akin to the problem of inverting H and is likely to be hard, although the one-way property for H is not strong enough to imply this. On the one hand, if Bob succeeds in finding such r′ 2 and b ′, he has indeed inverted H , but he does so only with the help of r1—information that is not generally available when attempting to invert H . The purpose of r1 is to strengthen the protection that Bob gets from the hash properties of H . Even without r1, the strong collision-free property of H would imply that Alice cannot find c, r2, and r′ 2 such that H(r20) = c = H(r ′ 21). But by using r1, Alice would have to find a new colliding pair for each run of the protocol. This protects Bob by preventing Alice from exploiting a few colliding pairs for H that she might happen to discover.
منابع مشابه
A Non-repudiable Biased Bitstring Commitment Scheme on a Post Quantum Cryptosystem
Commitment schemes are fundamental bricks for guaranteeing fairness in upper level cryptographic protocols. Most commitment schemes in the literature rely on hash functions, which should be strongly collision free for the scheme to be secure. We present a commitment scheme, which avoids hash functions by using a public-key cryptosystem based on braid conjugator search problem instead.
متن کاملAn Electronic Soccer Lottery System that Uses Bit Commitment ∗ ∗ ∗
This paper proposes an electronic soccer lottery protocol suitable for the Internet environment. Recently, protocols based on public-key schemes such as digital signature have been proposed for electronic voting systems or other similar systems. For a soccer lottery system in particular, it is important to reduce the computational complexity and the amount of communication data required, becaus...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملSelf - De nable Claw Free Functions
We propose a new type of claw free function family, a pseudo self-de nable claw free function family , which provides, by Damg ard's construction, a collision intractable hash function family that is more suitable in several cryptographic applications such as digital signature, bit commitment, etc. We give an example of self-de nable claw free function families based on the hardness of some num...
متن کاملBlockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles
PRO (Pseudorandom Oracle) is an important security of hash functions because it ensures that the hash function inherits all properties of a random oracle up to the PRO bound (e.g., security against length extension attack, collision resistant security, preimage resistant security and so on). In this paper, we propose new blockcipher-based double-length hash functions, which are PROs up to O(2) ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008