2013
DOI: 10.1007/978-3-642-36362-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Vector Commitments and Their Applications

Abstract: Abstract. We put forward the study of a new primitive that we call Vector Commitment (VC, for short). Informally, VCs allow to commit to an ordered sequence of q values (m1, . . . , mq) in such a way that one can later open the commitment at specific positions (e.g., prove that mi is the i-th committed message). For security, Vector Commitments are required to satisfy a notion that we call position binding which states that an adversary should not be able to open a commitment to two different values at the sam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
128
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 216 publications
(129 citation statements)
references
References 30 publications
0
128
1
Order By: Relevance
“…algorithm can be run by any user who holds a proof for some message at position with respect to , and it allows the user to compute an updated proof ′ (and the updated commitment ′) such that ′ will be valid with respect to ′ which contains ′ as the new message at position . Basically, the value U contains the update information which is needed to compute such values [22].…”
Section: Vector Commitmentmentioning
confidence: 99%
“…algorithm can be run by any user who holds a proof for some message at position with respect to , and it allows the user to compute an updated proof ′ (and the updated commitment ′) such that ′ will be valid with respect to ′ which contains ′ as the new message at position . Basically, the value U contains the update information which is needed to compute such values [22].…”
Section: Vector Commitmentmentioning
confidence: 99%
“…We provide two ideal functionalities F REV for revocation and propose two different constructions built from the vector commitments [10]. The first one hides the revocation status of a user from other users and from the verifiers, whereas in the second one, as for accumulators, revocation lists are public.…”
Section: Example: Flexible Revocation For Attribute-based Credentialsmentioning
confidence: 99%
“…For instance, in the traditional discrete logarithm setting, there are different solutions [21,4,2], where the size of the actual non-membership proof is O(k), O( √ k), O(log k), respectively. In other settings, the primitive of universal and dynamic cryptographic accumulators [9,20] can be used to obtain non-membership proofs whose size is independent of k. This is possible in the pairing-based setting (by using the accumulator-based protocols in [6,11]) and in the RSA-based setting (by using the accumulator-based protocol in [20]). …”
Section: The Problemmentioning
confidence: 99%