Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Truste

We present a new and very simple commitment scheme that does not depend on any assumptions about computational complexity the Sender and Receiver may both be computationally unbounded In stead the scheme utilizes a trusted initializer who participates only in an initial setup phase The scheme also utilizes private channels between each pair of parties The Sender is able to easily commit to a large value the scheme is not just a bit commitment scheme We also observe that out of n oblivious transfer is easily handled in the same model using a simple OT protocol due to Bennett et al

[1]  Gilles Brassard,et al.  Practical Quantum Oblivious Transfer , 1991, CRYPTO.

[2]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[3]  Shai Halevi,et al.  Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver , 1995, Journal of Cryptology.

[4]  Hoi-Kwong Lo,et al.  Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.

[5]  Moti Yung,et al.  Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols , 1991, Theor. Comput. Sci..

[6]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[7]  Sang-Ho Lee,et al.  How To Exchange Secrets By OT , 2000, International Conference on Internet Computing.

[8]  Atsushi Fujioka,et al.  Secure Bit Commitment Function against Divertibility , 1992, EUROCRYPT.

[9]  Silvio Micali,et al.  Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.

[10]  Manuel Blum,et al.  Non-interactive zero-knowledge and its applications , 1988, STOC '88.

[11]  Ivan Damgård,et al.  On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions , 1998, EUROCRYPT.

[12]  Moni Naor,et al.  Non-malleable cryptography , 1991, STOC '91.

[13]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[14]  Silvio Micali,et al.  Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing , 1996, CRYPTO.

[15]  Joe Kilian,et al.  Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[16]  Dominic Mayers Unconditionally secure quantum bit commitment is impossible , 1997 .

[17]  Rafail Ostrovsky,et al.  Secure Commitment Against A Powerful Adversary , 1992, STACS.

[18]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[19]  Louis Salvail,et al.  Quantum Bit Commitment from a Physical Assumption , 1998, CRYPTO.

[20]  Moti Yung,et al.  One-Way Group Actions , 1990, CRYPTO.

[21]  Moni Naor,et al.  Bit commitment using pseudorandomness , 1989, Journal of Cryptology.

[22]  Ivan Damgård,et al.  On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs , 1989, CRYPTO.