Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening

  • Authors:
  • Mihir Bellare;Dennis Hofheinz;Scott Yilek

  • Affiliations:
  • Dept. of Computer Science & Engineering, University of California at San Diego, La Jolla, USA CA 92093;CWI, Amsterdam,;Dept. of Computer Science & Engineering, University of California at San Diego, La Jolla, USA CA 92093

  • Venue:
  • EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The existence of encryption and commitment schemes secure under selective opening attack (SOA) has remained open despite considerable interest and attention. We provide the first public key encryption schemes secure against sender corruptions in this setting. The underlying tool is lossy encryption. We then show that no non-interactive or perfectly binding commitment schemes can be proven secure with black-box reductions to standard computational assumptions, but any statistically hiding commitment scheme is secure. Our work thus shows that the situation for encryption schemes is very different from the one for commitment schemes.