Lattice-Based Commitment Scheme for Low Communication Costs

被引:0
|
作者
Miyaji, Hideaki [1 ]
Wang, Yuntao [2 ]
Miyaji, Atsuko [3 ]
机构
[1] Ritsumeikan Univ, Coll Informat Sci & Technol, Ibaraki, Osaka 5678570, Japan
[2] Univ Electrocommun, Grad Sch Informat & Engn, Chofu, Tokyo 1828585, Japan
[3] Osaka Univ, Grad Sch Engn, Suita, Osaka 5650871, Japan
来源
IEEE ACCESS | 2024年 / 12卷
基金
日本学术振兴会;
关键词
Commitment scheme; lattice-based protocol; hiding property; binding property; AES-128; SECURE;
D O I
10.1109/ACCESS.2024.3421995
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Commitment schemes are cryptographic schemes that can be applied to zero-knowledge proof construction and blockchain construction. Recently, lattice-based cryptography has been intensively investigated due to the promising potential in quantum cryptography. Accordingly, commitment schemes based on lattice assumptions have been studied for practical applications. Notably, applications often require committing an arbitrary message with low communication costs, so commitment schemes must be satisfied with fewer length restrictions and fewer extensions to the messages. Several studies have been conducted to achieve the problem, including the study published by Baum et al. in 2018. However, the output length of their scheme is large in relation to the input length. We design a length-extension-free commitment scheme Com(MWM) in which the length of the message string is large relative to the length of the commitment string, improving on the commitment scheme of Baum et al. Furthermore, we prove that the hiding and binding properties of Com(MWM) are based on the hardness of the decisional search knapsack problem and extended search knapsack problems, respectively. Finally, we evaluate the computation costs of generating commitment value between ours and Baum et al.'s commitment scheme.
引用
收藏
页码:111400 / 111410
页数:11
相关论文
共 50 条
  • [41] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62
  • [42] A Lattice-Based Multisignature Scheme for Blockchain-Enabled Systems
    Liang, Xiao
    Wang, Xiaohui
    Zhang, Qianyi
    Yuan, Shuai
    Guan, Zhitao
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 336 - 346
  • [43] Masking the GLP Lattice-Based Signature Scheme at Any Order
    Gilles Barthe
    Sonia Belaïd
    Thomas Espitau
    Pierre-Alain Fouque
    Benjamin Grégoire
    Mélissa Rossi
    Mehdi Tibouchi
    Journal of Cryptology, 2024, 37
  • [44] A lattice-based forward secure IBE scheme for Internet of things
    Jin, Renjie
    Qu, Longjiang
    Chen, Rongmao
    Yang, Zhichao
    Wang, Yi
    INFORMATION SCIENCES, 2024, 660
  • [45] An Efficient Lattice-based Proxy Signature Scheme without Trapdoor
    Yang, Chunli
    Qiu, Peigang
    Zheng, Shihui
    Wang, Licheng
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 189 - 194
  • [46] A lattice-based ring signature scheme from bonsai trees
    Wang F.-H.
    Hu Y.-P.
    Wang C.-X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2400 - 2403
  • [47] Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
    Leevik, Anton
    Davydov, Vadim
    Bezzateev, Sergey
    CRYPTOGRAPHY, 2023, 7 (03)
  • [48] Masking the GLP Lattice-Based Signature Scheme at Any Order
    Barthe, Gilles
    Belaid, Sonia
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Rossi, Melissa
    Tibouchi, Mehdi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 354 - 384
  • [49] A New Lattice-Based Threshold Attribute-Based Signature Scheme
    Wang, Qingbin
    Chen, Shaozhen
    Ge, Aijun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 406 - 420
  • [50] A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method
    Lu, Xiuhua
    Yin, Wei
    Wen, Qiaoyan
    Jin, Zhengping
    Li, Wenmin
    IEEE ACCESS, 2018, 6 : 33986 - 33994