Reducing complexity assumptions for statistically-hiding commitment
From MaRDI portal
Recommendations
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Statistically-hiding commitment from any one-way function
- Reducing Complexity Assumptions for Oblivious Transfer
- Concurrent non-malleable statistically hiding commitment
- Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
- Somewhere statistically binding commitment schemes with applications
- Non-malleable statistically hiding commitment from any one-way function
- Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures
- scientific article; zbMATH DE number 1024061
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 4057439 (Why is no real title available?)
- scientific article; zbMATH DE number 177052 (Why is no real title available?)
- scientific article; zbMATH DE number 826071 (Why is no real title available?)
- scientific article; zbMATH DE number 4185033 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A Parallel Repetition Theorem
- A Pseudorandom Generator from any One-way Function
- A discrete logarithm implementation of perfect zero-knowledge blobs
- A fast and simple randomized parallel algorithm for the maximal independent set problem
- Bit commitment using pseudorandomness
- Foundations of Cryptography
- Foundations of Cryptography
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- How to construct constant-round zero-knowledge proof systems for NP
- How to sign given any trapdoor permutation
- Minimum disclosure proofs of knowledge
- Modern cryptography, probabilistic proofs and pseudo-randomness
- Necessary and sufficient conditions for collision-free hashing
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- On the Existence of Pseudorandom Generators
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures
- On the power of two-point based sampling
- Parallel coin-tossing and constant-round secure two-party computation
- Perfect zero-knowledge arguments for NP using any one-way permutation
- Practical and provably-secure commitment schemes from collision-free hashing
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Secure commitment against a powerful adversary
- Statistically-hiding commitment from any one-way function
- Universal classes of hash functions
Cited in
(10)- Weakening assumptions for publicly-verifiable deletion
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
- A new interactive hashing theorem
- Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function
- Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
- Statistically-hiding commitment from any one-way function
- One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
- Publicly-verifiable deletion via target-collapsing functions
- Construction and application of a perfectly hiding commitment scheme based on one-way functions
This page was built for publication: Reducing complexity assumptions for statistically-hiding commitment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1027978)