Reusable Online-Efficient Commitments

Nir Bitansky*, Omer Paneth, Dana Shamir

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An online-efficient commitment is a succinct locally-openable commitment, where the bulk of the sender work is done offline, generating an encoding x~ of the committed data x. In the online phase, both the sender, given random access to x~, and receiver run in polylogarithmic time in the length of x. Online-efficient commitments were recently constructed under the standard assumption of RingLWE by Lin, Mook, and Wichs, but with a significant caveat: they are not reusable. Their commitments are privately verifiable and cease to be binding if a malicious sender can learn whether the receiver accepts or rejects in repeated decommitment requests. We construct the first reusable online-efficient commitment under a standard assumption, Ring LWE. A main component in our analysis is a leakage lemma by Chung, Kalai, Liu, and Raz (CRYPTO ‘11) introduced in the context of streaming delegation schemes.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
EditorsLeonid Reyzin, Douglas Stebila
PublisherSpringer Science and Business Media Deutschland GmbH
Pages3-35
Number of pages33
ISBN (Print)9783031683961
DOIs
StatePublished - 2024
Event44th Annual International Cryptology Conference, CRYPTO 2024 - Santa Barbara, United States
Duration: 18 Aug 202422 Aug 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14927 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference44th Annual International Cryptology Conference, CRYPTO 2024
Country/TerritoryUnited States
CitySanta Barbara
Period18/08/2422/08/24

Fingerprint

Dive into the research topics of 'Reusable Online-Efficient Commitments'. Together they form a unique fingerprint.

Cite this