Commitment and authentication systems

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non- Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an authentication scheme and an unconditionally secure cipher system. To investigate the opposite direction, we define optimal commitment systems and show that these must be resolvable design commitment schemes. Then, a proof is given that the resolvable design commitment schemes are a composition of an authentication system and a cipher system and the conclusion follows that this is the case for all optimal commitment systems. We also show how to build optimal schemes from transversal designs that are easy to build and can be more efficiently implemented than the proposal in the previously cited paper. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Pinto, A., Souto, A., Matos, A., & Antunes, L. (2009). Commitment and authentication systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4883 LNCS, pp. 1–22). https://doi.org/10.1007/978-3-642-10230-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free