Paper 2008/102
Degradation and Amplification of Computational Hardness
Shai Halevi and Tal Rabin
Abstract
What happens when you use a partially defective bit-commitment protocol to commit to the same bit many times? For example, suppose that the protocol allows the receiver to guess the committed bit with advantage
Metadata
- Available format(s)
-
PDF PS
- Category
- Foundations
- Publication info
- Published elsewhere. TCC 2008
- Keywords
- Commitment schemesHardness amplification and degradationSecrecy amplification and degradationOblivious transferXOR lemmas
- Contact author(s)
- shaih @ alum mit edu
- History
- 2008-03-11: received
- Short URL
- https://ia.cr/2008/102
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/102, author = {Shai Halevi and Tal Rabin}, title = {Degradation and Amplification of Computational Hardness}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/102}, year = {2008}, url = {https://eprint.iacr.org/2008/102} }