More Efficient Commitments from Structured Lattice Assumptions
We present a practical construction of an additively homomorphic commitment scheme based on structured lattice assumptions, together with a zero-knowledge proof of opening knowledge. Our scheme is a design improvement over the previous work of Benhamouda et al. in that it is not restricted to being...
Saved in:
Published in | Security and Cryptography for Networks pp. 368 - 385 |
---|---|
Main Authors | , , , , |
Format | Book Chapter |
Language | English |
Published |
Cham
Springer International Publishing
2018
|
Series | Lecture Notes in Computer Science |
Online Access | Get full text |
Cover
Loading…
Abstract | We present a practical construction of an additively homomorphic commitment scheme based on structured lattice assumptions, together with a zero-knowledge proof of opening knowledge. Our scheme is a design improvement over the previous work of Benhamouda et al. in that it is not restricted to being statistically binding. While it is possible to instantiate our scheme to be statistically binding or statistically hiding, it is most efficient when both hiding and binding properties are only computational. This results in approximately a factor of 4 reduction in the size of the proof and a factor of 6 reduction in the size of the commitment over the aforementioned scheme. |
---|---|
AbstractList | We present a practical construction of an additively homomorphic commitment scheme based on structured lattice assumptions, together with a zero-knowledge proof of opening knowledge. Our scheme is a design improvement over the previous work of Benhamouda et al. in that it is not restricted to being statistically binding. While it is possible to instantiate our scheme to be statistically binding or statistically hiding, it is most efficient when both hiding and binding properties are only computational. This results in approximately a factor of 4 reduction in the size of the proof and a factor of 6 reduction in the size of the commitment over the aforementioned scheme. |
Author | Oechsner, Sabine Lyubashevsky, Vadim Baum, Carsten Peikert, Chris Damgård, Ivan |
Author_xml | – sequence: 1 givenname: Carsten surname: Baum fullname: Baum, Carsten – sequence: 2 givenname: Ivan surname: Damgård fullname: Damgård, Ivan – sequence: 3 givenname: Vadim surname: Lyubashevsky fullname: Lyubashevsky, Vadim email: vad@zurich.ibm.com – sequence: 4 givenname: Sabine surname: Oechsner fullname: Oechsner, Sabine – sequence: 5 givenname: Chris surname: Peikert fullname: Peikert, Chris |
BookMark | eNpVkM1OwzAQhA0UiVD6BhzyAoa1N4ntC1JVlR-piANwtlJnjQIkrmL3_XELF047-ma12plLNhvDSIxdC7gRAOrWKM2RozDcaCGQg5VwwhYZY4ZHBqesEI0QHLEyZ_88iTNWAILkRlV4wRYxfgKABG006oLdPYeJyrX3vetpTOUqDEOfhixj6acwlK9p2ru0n6grN21KvaNyGeN-2KU-jPGKnfv2O9Lib87Z-_36bfXINy8PT6vlhkchdeI1eFEbU5EGEmR8Q42RrqO61oReKUn58W7bVk52jTMtaMo7SrVKZOU0zpn8vRt3Uz9-0GS3IXxFK8AeSrI5sUWbM9tjIfZQEv4AkjhXjw |
ContentType | Book Chapter |
Copyright | Springer Nature Switzerland AG 2018 |
Copyright_xml | – notice: Springer Nature Switzerland AG 2018 |
DOI | 10.1007/978-3-319-98113-0_20 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783319981130 3319981137 |
EISSN | 1611-3349 |
Editor | Catalano, Dario De Prisco, Roberto |
Editor_xml | – sequence: 1 givenname: Dario surname: Catalano fullname: Catalano, Dario email: catalano@dmi.unict.it – sequence: 2 givenname: Roberto surname: De Prisco fullname: De Prisco, Roberto email: robdep@unisa.it |
EndPage | 385 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-s128t-50f15994e80e1e9f6e692cde558e3f772e349dba4c2d6c9a08ef6e77a718efc83 |
ISBN | 9783319981123 3319981129 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:14:46 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s128t-50f15994e80e1e9f6e692cde558e3f772e349dba4c2d6c9a08ef6e77a718efc83 |
Notes | Full version of the paper available at https://eprint.iacr.org/2016/997.C. Baum—Supported by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office and COST Action IC1306.I. Damgård—Supported by the European Research Council (ERC) under the European Unions’s Horizon 2020 research and innovation programme under grant agreement No 669255 (MPCPRO).V. Lyubashevsky—Supported by the SNSF ERC Transfer Grant CRETP2-166734 – FELICITY.S. Oechsner—Supported by the European Research Council (ERC) under the European Unions’s Horizon 2020 research and innovation programme under grant agreement No 669255 (MPCPRO); the Danish Independent Research Council under Grant-ID DFF-6108-00169 (FoCC); the European Union’s Horizon 2020 research and innovation programme under grant agreement No 731583 (SODA).C. Peikert—Supported by the National Science Foundation under CAREER Award CCF-1054495 and CNS-1606362, the Alfred P. Sloan Foundation, and by a Google Research Award. The views expressed are those of the authors and do not necessarily reflect the official policy or position of the National Science Foundation, the Sloan Foundation, or Google. |
PageCount | 18 |
ParticipantIDs | springer_books_10_1007_978_3_319_98113_0_20 |
PublicationCentury | 2000 |
PublicationDate | 2018 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – year: 2018 text: 2018 |
PublicationDecade | 2010 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationSeriesSubtitle | Security and Cryptology |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings |
PublicationTitle | Security and Cryptography for Networks |
PublicationYear | 2018 |
Publisher | Springer International Publishing |
Publisher_xml | – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
SSID | ssj0002089838 ssj0002792 |
Score | 2.2469451 |
Snippet | We present a practical construction of an additively homomorphic commitment scheme based on structured lattice assumptions, together with a zero-knowledge... |
SourceID | springer |
SourceType | Publisher |
StartPage | 368 |
Title | More Efficient Commitments from Structured Lattice Assumptions |
URI | http://link.springer.com/10.1007/978-3-319-98113-0_20 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9tAEF6F9FJxANoiKFDtgRtyZWf9PFCpClSA0lwKiJu13h1DDkkq4iDBT-mv7czu-kHgAhcrWjuxM996dnZmvhnGDlUhhUqE8jTxt8IgLD2plPbSMkySuNRxZmp3_h7HZ1fhxU100-v962QtLaviu3p6lVfyHlRxDHElluwbkG1-FAfwM-KLR0QYjyvG73M3q-VwuM5zxv0_vH_8W7nq0yZzcGzTu1snuLQNjYe4ka1a-teJnN6aWHlkU9zPHzo5Oo9LXOPu4MH5V6-lnkwbpyyou0XdtUsWTXTe9Yaa3wM1bZ4YuiUpnemksmQ6w2f5Y6rWLin3fSQryr-jeYIzq3UfkgBhcTxyMY7xvDKpY0d1G4paK3XdFkG64rao3ZYrjs_W9_ZsnysEUQHRNBQd9ShQl-NuyA6BVd8xFWUUtgiqU8nCtu1xq7uwDYJeLBzdXBHiddHdhOfnA3-NrSVp1Gcffp5ejK4b_93ATzMTcXarPhVitBEr-1TEI6qfOrOVntp_0eFwvnbLF1F5Y-xcbrJ1IsBwYqag0LZYD2af2EYtd-7k_pn9IJR5gzLvoMwJZd6izB3KvIPyF3b16_RyeOa5dhzeAo2Yyov8Em3fLITUhwCyMgZ8kZWGKEpBlLhLAxS8LmSoBjpWmfRTwGuSRKL5A6VKxTbrz-Yz2GG8DDSe1z5-FXfoIs50gCuB1AAqkJCJXXZUCyCnF2yR19W1UVy5yFFcuRFXTuL6-qar99jHdj7usz6KAg7QsKyKbw7j_0wVcqc |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.au=Baum%2C+Carsten&rft.au=Damg%C3%A5rd%2C+Ivan&rft.au=Lyubashevsky%2C+Vadim&rft.au=Oechsner%2C+Sabine&rft.atitle=More+Efficient+Commitments+from+Structured+Lattice+Assumptions&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2018-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319981123&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=368&rft.epage=385&rft_id=info:doi/10.1007%2F978-3-319-98113-0_20 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |