Non-committing encryptions based on oblivious Naor-Pinkas cryptosystems

4Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Designing non-committing encryptions tolerating adaptive adversaries, who are able to corrupt parties on the fly in the course of computation has been a challenge task. In this paper, we make progress in this area. First, we introduce a new notion called oblivious Naor-Pinkas cryptosystems that benefits us to extract the randomness used to generate local public keys and thus enable us to construct corresponding simulator for a given adaptive adversary in a real-world protocol. We then give a simple construction of non-committing encryptions based on oblivious Naor-Pinkas cryptosystems. We show that the proposed non-committing encryption scheme is provably secure against an adaptive PPT adversary assuming that the decisional Diffie-Hellman problem is hard. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhu, H., & Bao, F. (2009). Non-committing encryptions based on oblivious Naor-Pinkas cryptosystems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 418–429). https://doi.org/10.1007/978-3-642-10628-6_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free