Principles and practice of information theory
Principles and practice of information theory
A note on efficient zero-knowledge proofs and arguments (extended abstract)
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes
Designs, Codes and Cryptography
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
Commitment and authentication systems
Designs, Codes and Cryptography
New monotones and lower bounds in unconditional two-party computation
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
On the efficiency of bit commitment reductions
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Hi-index | 0.00 |
In this paper we deal with unconditionally secure commitment schemes based on pre-distributed data. We provide bounds for the amount of data which has to be pre-distributed to the participants of the commitment, thus solving an open problem stated in the literature. We also introduce the issue of homomorphism in unconditionally secure commitment schemes. We provide a definition and a construction based on modules of mappings over finite rings. As an application of our constructions, we provide a new pre-distributed primitive which yields non-interactive unconditionally secure zero knowledge proofs of any polynomial relation among commitments.