cryptographic assumptions
Recently Published Documents


TOTAL DOCUMENTS

22
(FIVE YEARS 8)

H-INDEX

7
(FIVE YEARS 0)

Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 131
Author(s):  
Sungwook Kim

Succinct Non-interactive Arguments of Knowledge (SNARks) are receiving a lot of attention as a core privacy-enhancing technology for blockchain applications. Polynomial commitment schemes are important building blocks for the construction of SNARks. Polynomial commitment schemes enable the prover to commit to a secret polynomial of the prover and convince the verifier that the evaluation of the committed polynomial is correct at a public point later. Bünz et al. recently presented a novel polynomial commitment scheme with no trusted setup in Eurocrypt’20. To provide a transparent setup, their scheme is built over an ideal class group of imaginary quadratic fields (or briefly, class group). However, cryptographic assumptions on a class group are relatively new and have, thus far, not been well-analyzed. In this paper, we study an approach to transpose Bünz et al.’s techniques in the discrete log setting because the discrete log setting brings a significant improvement in efficiency and security compared to class groups. We show that the transposition to the discrete log setting can be obtained by employing a proof system for the equality of discrete logarithms over multiple bases. Theoretical analysis shows that the transposition preserves security requirements for a polynomial commitment scheme.


2021 ◽  
Vol 7 (4) ◽  
pp. 119-127
Author(s):  
A. Gerasimovich

In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.


Author(s):  
V. Korzhik ◽  
V. Starostin ◽  
M. Kabardov ◽  
V. Yakovlev ◽  
A. Gerasimovich ◽  
...  

2021 ◽  
Vol 34 (1) ◽  
Author(s):  
Alon Rosen ◽  
Gil Segev ◽  
Ido Shahaf

2019 ◽  
Author(s):  
Nik Nadhilah Nik Mohd Yusoff ◽  
Haslinda Ibrahim ◽  
Mohd Saiful Adli Mohamad

2018 ◽  
Vol 32 (2) ◽  
pp. 324-360 ◽  
Author(s):  
Gilles Barthe ◽  
Edvard Fagerholm ◽  
Dario Fiore ◽  
John Mitchell ◽  
Andre Scedrov ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document