### On the round complexity of black-box constructions of commitments secure against selective opening attacks

David Xiao

##### Abstract

Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the following black-box constructions and black-box lower bounds for commitments secure against selective opening attacks for parallel composition: 1. $3$ (resp. $4$) rounds are necessary to build computationally (resp. statistically) binding and computationally hiding commitments. 2. There is a black-box construction of $(t+3)$-round statistically binding commitments secure against selective opening attacks based on $t$-round stand-alone statistically hiding commitments. 3. $O(1)$-round statistically-hiding commitments are equivalent to $O(1)$-round statistically-binding commitments. Our lower bounds improve upon the parameters obtained by the impossibility results of Bellare \etal{} (EUROCRYPT '09), and are proved in a fundamentally different way, by observing that essentially all known impossibility results for black-box zero-knowledge can also be applied to the case of commitments secure against selective opening attacks.

Note: Ostrovsky et al. (ePrint report 2011/536) discovered several errors in the original manuscript. This revision takes into account these errors.

Available format(s)
Publication info
Published elsewhere. TCC 2011
Keywords
selective opening attacks
Contact author(s)
dxiao @ liafa univ-paris-diderot fr
History
2012-05-29: last of 6 revisions
See all versions
Short URL
https://ia.cr/2009/513

CC BY

BibTeX

@misc{cryptoeprint:2009/513,
author = {David Xiao},
title = {On the round complexity of black-box constructions of commitments secure against selective opening attacks},
howpublished = {Cryptology ePrint Archive, Paper 2009/513},
year = {2009},
note = {\url{https://eprint.iacr.org/2009/513}},
url = {https://eprint.iacr.org/2009/513}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.