Mutually independent commitments

Moses Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam Smith

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

We study the two-party commitment problem, where two players have secret values they wish to commit to each other. Traditional commitment schemes cannot be used here because they do not guarantee independence of the committed values. We present three increasingly strong definitions of independence in this setting and give practical protocols for each. Our work is related to work in non-malleable cryptography. However, the two-party commitment problem can be solved much more efficiently than by using non-malleability techniques.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsColin Boyd
PublisherSpringer Verlag
Pages385-401
Number of pages17
ISBN (Print)3540429875, 9783540429876
Publication statusPublished - Jan 1 2001
Event7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 - Gold Coast, Australia
Duration: Dec 9 2001Dec 13 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2248
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001
CountryAustralia
CityGold Coast
Period12/9/0112/13/01

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Liskov, M., Lysyanskaya, A., Micali, S., Reyzin, L., & Smith, A. (2001). Mutually independent commitments. In C. Boyd (Ed.), Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 385-401). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2248). Springer Verlag.