Information-theoretically secure string commitments based on packet reordering channels

Vinicius De Morais Alves, Rafael Dowsley, Rafael Timoteo De Sousa, Anderson C.A. Nascimento

Research output: Contribution to journalArticleResearchpeer-review

Abstract

Realizing fundamental cryptographic primitives with unconditional security is a central topic in information-theoretic cryptography. These primitives can be realized based on physical assumptions, such as the existence of noisy channels, an upper bound on the storage capacity, or the laws of quantum mechanics. Palmieri and Pereira [1] demonstrated that delays in communication channels can be used as a reasonable and effective assumption to obtain an unconditionally secure oblivious transfer protocol against honest-but-curious adversaries. While any oblivious transfer protocol secure against malicious adversaries can be used to implement commitment, the reduction does not work if the oblivious transfer protocol is only secure against honest-but-curious adversaries. Thus, the question of obtaining a secure commitment protocol based on channel delays is still open. In this paper, we provide a concrete protocol for implementing string commitments based on packet reordering – a consequence of channel delays in packet networks.

Original languageEnglish
Pages (from-to)139928 - 139945
Number of pages18
JournalIEEE Access
Volume9
DOIs
Publication statusPublished - 8 Oct 2021

Keywords

  • Commitment schemes
  • Cryptography
  • Delays
  • Entropy
  • Noise measurement
  • packet reordering
  • Protocols
  • Random variables
  • Security
  • unconditional security

Cite this