TY - GEN
T1 - Analysis and improvement of Lindell's UC-secure commitment schemes
AU - Blazy, Olivier
AU - Chevalier, Céline
AU - Pointcheval, David
AU - Vergnaud, Damien
PY - 2013/7/12
Y1 - 2013/7/12
N2 - In 2011, Lindell proposed an efficient commitment scheme, with a non-interactive opening algorithm, in the Universal Composability (UC) framework. He recently acknowledged a bug in its security analysis for the adaptive case. We analyze the proof of the original paper and propose a simple patch of the scheme. More interestingly, we then modify it and present a more efficient commitment scheme secure in the UC framework, with the same level of security as Lindell's protocol: adaptive corruptions, with erasures. The security is proven in the standard model (with a Common Reference String) under the classical Decisional Diffie-Hellman assumption. Our proposal is the most efficient UC-secure commitment proposed to date (in terms of computational workload and communication complexity).
AB - In 2011, Lindell proposed an efficient commitment scheme, with a non-interactive opening algorithm, in the Universal Composability (UC) framework. He recently acknowledged a bug in its security analysis for the adaptive case. We analyze the proof of the original paper and propose a simple patch of the scheme. More interestingly, we then modify it and present a more efficient commitment scheme secure in the UC framework, with the same level of security as Lindell's protocol: adaptive corruptions, with erasures. The security is proven in the standard model (with a Common Reference String) under the classical Decisional Diffie-Hellman assumption. Our proposal is the most efficient UC-secure commitment proposed to date (in terms of computational workload and communication complexity).
U2 - 10.1007/978-3-642-38980-1_34
DO - 10.1007/978-3-642-38980-1_34
M3 - Conference contribution
AN - SCOPUS:84879851677
SN - 9783642389795
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 534
EP - 551
BT - Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings
T2 - 11th International Conference on Applied Cryptography and Network Security, ACNS 2013
Y2 - 25 June 2013 through 28 June 2013
ER -