Abstract
We study the two-party commitment problem, where two players have secret values they wish to commit to each other. Traditional commitment schemes cannot be used here because they do not guarantee independence of the committed values. We present three increasingly strong definitions of independence in this setting and give practical protocols for each. Our work is related to work in non-malleable cryptography. However, the two-party commitment problem can be solved much more efficiently than by using non-malleability techniques.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Manuel Blum, Alfredo De Santis, Silvio Micali, and Giuseppe Persiano. Noninteractive zero-knowledge. SIAM Journal on Computing, 20(6):1084–1118, December 1991.
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850–863, November 1984.
A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In Michael Wiener, editor, Advances in Cryptology—CRYPTO’ 99, volume 1666 of Lecture Notes in Computer Science, pages 80–97. Springer-Verlag, 15–19 August 1999.
Ronald Cramer, Ivan Damgård, and Philip MacKenzie. Efficient zeroknowledge proofs of knowledge without intractability assumptions. In Public Key Cryptography (PKC 2000), pages 354–372. Springer-Verlag, 2000.
R. Canetti and M. Fischlin. Universally composable commitments. In Joe Kilian, editor, Advances in Cryptology—CRYPTO 2001, Lecture Notes in Computer Science. Springer-Verlag, 19–23 August 2001.
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In 26th IEEE Symposium on Foundations of Computer Science, pages 383–395, 1985.
Benny Chor and Michael Rabin. Achieving independence in logarithmic number of rounds. In Principles of Distributed Computing (PODC 87), pages 260–268. ACM, 1987.
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against chosen ciphertext attack. In Hugo Krawczyk, editor, Advances in Cryptology—CRYPTO’ 98, volume 1462 of Lecture Notes in Computer Science. Springer-Verlag, 23—27 August 1998.
D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM, 30:391–437, 2000.
Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano. Necessary and suficient assumptions for non-interactive zero-knowledge proofs of knowledge for all np relations. In U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Automata Languages and Programming: 27th International Colloquim (ICALP 2000), volume 1853 of Lecture Notes in Computer Science, pages 451–462. Springer-Verlag, July 9–15 2000.
G. Di Crescenzo, Y. Ishai, and R. Ostrovsky. Non-interactive and nonmalleable commitment. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, Texas, 23–26 May 1998.
G. Di Crescenzo, J. Katz, R. Ostrovsky, and A. Smith. Efficient and noninteractive non-malleable commitment. In Birgit Pfitzmann, editor, Advances in Cryptology—EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 40–59. Springer-Verlag, 6–10 May 2001.
Alfredo De Santis and Giuseppe Persiano. Zero-knowledge proofs of knowledge without interaction. In 33rd Annual Symposium on Foundations of Computer Science, pages 427–436, Pittsburgh, Pennsylvania, 24–27 October 1992. IEEE.
M. Fischlin and R. Fischlin. Efficient non-malleable commitment schemes. In Mihir Bellare, editor, Advances in Cryptology—CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science. Springer-Verlag, 20–24 August 2000.
Uriel Feige, Amos Fiat, and Adi Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77–94, 1988.
Uriel Feige and Adi Shamir. Zero knowledge proofs of knowledge in two rounds. In G. Brassard, editor, Advances in Cryptology—CRYPTO’ 89, volume 435 of Lecture Notes in Computer Science, pages 526–545. Springer-Verlag, 1990, 20–24 August 1989.
Rosario Gennaro. Achieving independence efficiently and securely. In Principles of Distributed Computing (PODC 95), pages 130–136. ACM, 1995.
O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. In Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, pages 25–32, Seattle, Washington, 15–17 May 1989.
S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28(2):270–299, April 1984.
Sha. Goldwasser, Silvio Micali, and Charles Rackoff. Knowledge complexity of interactive proofs. In Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pages 291–304, Providence, Rhode Island, 6–8 May 1985.
Sha. Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April 1988.
J. Katz, R. Ostrovsky, and A. Smith. Personal Communication.
Moni Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151–158, 1991.
Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology—CRYPTO’ 91, volume 576 of Lecture Notes in Computer Science, pages 129–140. Springer-Verlag, 1992, 11–15 August 1991.
Amit Sahai. Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security. In 40th Annual Symposium on Foundations of Computer Science, New York, October 1999. IEEE.
C. P. Schnorr. Efficient identification and signatures for smart cards. In J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology—EUROCRYPT 89, volume 434 of Lecture Notes in Computer Science, pages 688–689. Springer-Verlag, 1990, 10–13 April 1989.
Martin Tompa and Heather Woll. Random self-reducibility and zero knowledge interactive proofs of possession of information. In 28th Annual Symposium on Foundations of Computer Science, pages 472–482, Los Angeles, California, 12–14 October 1987. IEEE.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liskov, M., Lysyanskaya, A., Micali, S., Reyzin, L., Smith, A. (2001). Mutually Independent Commitments. In: Boyd, C. (eds) Advances in Cryptology — ASIACRYPT 2001. ASIACRYPT 2001. Lecture Notes in Computer Science, vol 2248. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45682-1_23
Download citation
DOI: https://doi.org/10.1007/3-540-45682-1_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42987-6
Online ISBN: 978-3-540-45682-7
eBook Packages: Springer Book Archive