TY - GEN
T1 - Adaptive and composable non-interactive string-commitment protocols
AU - Zhu, Huafei
AU - Araragi, Tadashi
AU - Nishide, Takashi
AU - Sakurai, Kouichi
PY - 2012/3/2
Y1 - 2012/3/2
N2 - In this paper, a non-interactive string-commitment protocol in the common reference string model is presented and analyzed. We show that the proposed (length-flexible) commitment protocol realizes the universally composable security in the presence of adaptive adversaries in the standard computational model assuming that the underlying Paillier's public-key encryption (or Damgård and Jurik's public-key encryption scheme when a lengthflexible property is claimed) is semantically secure and the Damgård-Fazio- Nicolosi's non-interactive protocol is zero-knowledge in the registered public-key model.
AB - In this paper, a non-interactive string-commitment protocol in the common reference string model is presented and analyzed. We show that the proposed (length-flexible) commitment protocol realizes the universally composable security in the presence of adaptive adversaries in the standard computational model assuming that the underlying Paillier's public-key encryption (or Damgård and Jurik's public-key encryption scheme when a lengthflexible property is claimed) is semantically secure and the Damgård-Fazio- Nicolosi's non-interactive protocol is zero-knowledge in the registered public-key model.
UR - http://www.scopus.com/inward/record.url?scp=84863413676&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863413676&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-25206-8_15
DO - 10.1007/978-3-642-25206-8_15
M3 - Conference contribution
AN - SCOPUS:84863413676
SN - 9783642252051
T3 - Communications in Computer and Information Science
SP - 233
EP - 242
BT - e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers
T2 - 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010
Y2 - 26 July 2010 through 28 July 2010
ER -