Non-committing Encryption from Φ-hiding
Brett Hemenway, Rafail Ostrovsky, Alon Rosen
A multiparty computation protocol is said to be adaptively secure if it retains its security even in the presence of an adversary who can corrupt participants as the protocol proceeds. This is in contrast to the static corruption model where the adversary is forced to choose which participants to corrupt before the protocol begins.
A central tool for constructing adaptively secure protocols is non-committing encryption (Canetti, Fiege, Goldreich and Naor, STOC'96). The original protocol of Canetti et al. had cipher text expansion that was quadratic in the security parameter. In this work, we present the first non-committing encryption scheme that achieves ciphertext expansion that is logarithmic in the message length.
Our construction has optimal round complexity (2-rounds), where (just as in all previous constructions) the first message consists of a public-key of size Õ(nλ) where n is the message length and is the security parameter. The second messagfe consists of a ciphertext of size ∂(n logn + λ). The security of our scheme is proved based on the Φ-hiding problem.
comment: TCC 2015 pp: 591-608
Fetch PDF file of the paper
|Back to Publications List|