Round-Efficient One-Way Permutation Based Perfectly Concealing Bit Commitment Scheme
نویسندگان
چکیده
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment schemes based on the general computational assumption. The best known scheme in the literature is the one-way permutation based scheme due to Naor, Ostrovsky, Venkatesan and Yung and its round complexity is O(n). We consider a naive parallel version of their scheme of the multiplicity logn and obtain an O(n/ logn)-round scheme. In their conference paper (at CRYPTO’92), they claimed that such a round reduction of any logarithmic factor is achievable. We work out the details of their claim. Namely, we give an explicit justification of the folklore that such a parallelization would not lose the security proof. Though the parallelization raises an analytic difficulty, we introduce a new analysis technique and then overcome the difficulty. Our technique copes with expected almost pairwise independent random variables instead of the pairwise independence, which is a key property in their analysis. While the expected almost pairwise independence plays an important role in our security proof, it also provides alternative security proof for the original scheme.
منابع مشابه
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is unconditionally concealing and computationally binding. Unlike the classical reduction of Naor, Ostrovski, Ventkatesen and Young, our protocol is non-interactive and has communication complexity O(n) qubits for n a security p...
متن کاملA Quantum Goldreich-Levin Theorem with Cryptographic Applications
We investigate the Goldreich-Levin Theorem in the context of quantum information. This result is a reduction from the computational problem of inverting a one-way function to the problem of predicting a particular bit associated with that function. We show that the quantum version of the reduction—between quantum one-way functions and quantum hard-predicates—is quantitatively more efficient tha...
متن کاملM ar 2 00 4 An Unconditionally Secure Quantum Bit Commitment Scheme
An unconditionally secure quantum bit commitment is proposed in this paper. we show that this scheme is statistically binding and perfectly concealing. The security of the protocol is based on the existence of quantum one-way functions by fundamental principles of quantum physics. As a conclusion of this paper, statistically binding and perfectly concealing quantum bit commitment schemes can be...
متن کاملAn Unconditionally Secure Quantum Bit Commitment Scheme ⋆
Bit commitment plays an important role in modern cryptography and is widely utilized in protocol design. In this paper, we propose an unconditionally secure quantum bit commitment scheme which is statistically binding and perfectly concealing. The security of this scheme is based on the existence of quantum one-way functions by fundamental principles of quantum physics. As a conclusion of this ...
متن کاملA Statistically Secure Quantum Bit Commitment Scheme
Bit commitment plays an important role in modern cryptography and is utilized widely in protocol design. In this paper, we propose a quantum bit commitment scheme which is statistically binding and perfectly concealing. The security of this scheme is based on the existence of quantum one-way functions by fundamental principles of quantum physics. Relationship of this proposed scheme to Mayers-L...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 13 شماره
صفحات -
تاریخ انتشار 2006