Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

作者: Seung Geol Choi , Dana Dachman-Soled , Tal Malkin , Hoeteck Wee

DOI: 10.1007/978-3-642-10366-7_17

关键词:

摘要: We present a new construction of non-committing encryption schemes. Unlike the previous constructions Canetti et al. (STOC '96) and Damgard Nielsen (Crypto '00), our achieves all following properties: Optimal round complexity. Our scheme is 2-round protocol, matching complexity improving upon that in Nielsen. Weaker assumptions. based on trapdoor simulatable cryptosystems , primitive we introduce as relaxation those used works. also show how to realize this hardness factoring. Improved efficiency. The amortized encrypting single bit O (1) public key operations constant-sized plaintext underlying cryptosystem. As result, obtain first public-key schemes under factoring worst-case lattice assumptions; previously, such were only known CDH RSA Combined with existing work secure multi-party computation, protocols for computation against malicious adversary may adaptively corrupt an arbitrary number parties weaker assumptions than previously known. Specifically, both stand-alone setting UC common reference string.

参考文章(40)
Jonathan Katz, Rafail Ostrovsky, Round-Optimal Secure Two-Party Computation Advances in Cryptology – CRYPTO 2004. pp. 335- 354 ,(2004) , 10.1007/978-3-540-28628-8_21
Donald Beaver, Plug and Play Encryption international cryptology conference. pp. 75- 89 ,(1997) , 10.1007/BFB0052228
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee, Simple, Black-Box Constructions of Adaptively Secure Protocols theory of cryptography conference. pp. 387- 402 ,(2009) , 10.1007/978-3-642-00457-5_23
Stanisław Jarecki, Anna Lysyanskaya, Adaptively secure threshold cryptography: introducing concurrency, removing erasures theory and application of cryptographic techniques. pp. 221- 242 ,(2000) , 10.1007/3-540-45539-6_16
Donald Beaver, Stuart Haber, Cryptographic protocols provably secure against dynamic adversaries theory and application of cryptographic techniques. pp. 307- 323 ,(1992) , 10.1007/3-540-47555-9_26
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Founding Cryptography on Oblivious Transfer --- Efficiently international cryptology conference. pp. 572- 591 ,(2008) , 10.1007/978-3-540-85174-5_32
C. P. Schnorr, Security of 2^t-Root Identification and Signatures international cryptology conference. pp. 143- 156 ,(1996) , 10.1007/3-540-68697-5_12
Ivan Damgård, Jesper Buus Nielsen, Improved Non-committing Encryption Schemes Based on a General Complexity Assumption international cryptology conference. pp. 432- 450 ,(2000) , 10.1007/3-540-44598-6_27
Donald Beaver, Adaptively Secure Oblivious Transfer international cryptology conference. pp. 300- 314 ,(1998) , 10.1007/3-540-49649-1_24