Web@inproceedings{crypto-1989-1573, title={Bit Commitment Using Pseudo-Randomness}, booktitle={Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology … WebA zap is a 2‐round, public coin witness‐indistinguishable protocol in which the first round, consisting of a message from the verifier to the prover, can be fixed “once and for all” and applied to any instance. We present a zap for every language in NP, based on the existence of noninteractive zero‐knowledge proofs in the shared random string model. The zap is …
Nonmalleable Cryptography SIAM Review
In 1991 Moni Naor showed how to create a bit-commitment scheme from a cryptographically secure pseudorandom number generator. The construction is as follows. If G is pseudo-random generator such that G takes n bits to 3n bits, then if Alice wants to commit to a bit b: Bob selects a random 3n-bit … See more A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later. Commitment … See more Formal definitions of commitment schemes vary strongly in notation and in flavour. The first such flavour is whether the commitment scheme provides perfect or computational … See more Some commitment schemes permit a proof to be given of only a portion of the committed value. In these schemes, the secret value $${\displaystyle X}$$ is a vector of many … See more Physical unclonable functions (PUFs) rely on the use of a physical key with internal randomness, which is hard to clone or to emulate. Electronic, optical and other types of PUFs have … See more Coin flipping Suppose Alice and Bob want to resolve some dispute via coin flipping. If they are physically in the same place, a typical procedure might be: 1. Alice "calls" the coin flip 2. Bob flips the coin See more A commitment scheme can either be perfectly binding (it is impossible for Alice to alter her commitment after she has made it, even if she has unbounded computational … See more It is an interesting question in quantum cryptography if unconditionally secure bit commitment protocols exist on the quantum level, that is, protocols which are (at least … See more WebWe show how a pseudo-random generator can provide a bit commitment protocol. We also analyze the number of bits communicated when parties commit to many bits simultaneously, and show that the assumption of the existence of pseudorandom generators suffices to assure amortized O (1) bits of communication per bit commitment. References rawlins paints leeds uk
Delegating Computation: Interactive Proofs for Muggles
WebDec 24, 2024 · If e.g. one had a pseudo-random number generator whose initial state was completely unpredictable, and which could be treated as a random oracle unless someone had access to about two billion consecutive bits, and a program used it to produce 10,000 bits, that would be fine if nobody else could get more numbers based upon the same … WebNov 1, 2004 · We show that if the adversary is constrained by an (α, β) assumption then there exist four-round almost concurrent zero-knowledge interactive proofs and perfect concurrent zero-knowledge arguments for every language in NP. WebJan 1, 2005 · M. Naor, Bit commitment using pseudo-randomness, J. Cryptology, vol. 4, pp. 151-158, 1991. M. Naor and K. Nissim, Communication preserving protocols for secure function evaluation, Proc. 33rd STOC, pp. 590-599, 2001. simple hat sewing pattern