Ontology type: schema:Chapter Open Access: True
2005
AUTHORS ABSTRACTIn this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called “tamper-evident seals”. Another physical object with this property is the “scratch-off card”, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions. More... »
PAGES285-297
Automata, Languages and Programming
ISBN
978-3-540-27580-0
978-3-540-31691-6
http://scigraph.springernature.com/pub.10.1007/11523468_24
DOIhttp://dx.doi.org/10.1007/11523468_24
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1015897667
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computation Theory and Mathematics",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel",
"id": "http://www.grid.ac/institutes/grid.13992.30",
"name": [
"Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
],
"type": "Organization"
},
"familyName": "Moran",
"givenName": "Tal",
"id": "sg:person.012022173111.00",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel",
"id": "http://www.grid.ac/institutes/grid.13992.30",
"name": [
"Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
],
"type": "Organization"
},
"familyName": "Naor",
"givenName": "Moni",
"id": "sg:person.07776170271.83",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83"
],
"type": "Person"
}
],
"datePublished": "2005",
"datePublishedReg": "2005-01-01",
"description": "In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called \u201ctamper-evident seals\u201d. Another physical object with this property is the \u201cscratch-off card\u201d, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions.",
"editor": [
{
"familyName": "Caires",
"givenName": "Lu\u00eds",
"type": "Person"
},
{
"familyName": "Italiano",
"givenName": "Giuseppe F.",
"type": "Person"
},
{
"familyName": "Monteiro",
"givenName": "Lu\u00eds",
"type": "Person"
},
{
"familyName": "Palamidessi",
"givenName": "Catuscia",
"type": "Person"
},
{
"familyName": "Yung",
"givenName": "Moti",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/11523468_24",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-540-27580-0",
"978-3-540-31691-6"
],
"name": "Automata, Languages and Programming",
"type": "Book"
},
"keywords": [
"common cryptographic operations",
"cryptographic operations",
"security properties",
"cryptographic protocols",
"cryptographic assumptions",
"original sender",
"oblivious transfer",
"physical objects",
"tamper-evident seals",
"real life",
"scratch",
"cards",
"coin flipping",
"sender",
"protocol",
"box",
"functionality",
"objects",
"tickets",
"physical model",
"model",
"operation",
"lock",
"standard model",
"flipping",
"containers",
"interest",
"illustration",
"particular interest",
"assumption",
"lottery tickets",
"properties",
"life",
"transfer",
"envelope",
"bias",
"seals",
"paper",
"intuitive physical model"
],
"name": "Basing Cryptographic Protocols on Tamper-Evident Seals",
"pagination": "285-297",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1015897667"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/11523468_24"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/11523468_24",
"https://app.dimensions.ai/details/publication/pub.1015897667"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:49",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_82.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/11523468_24"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'
This table displays all metadata directly associated to this object as RDF triples.
126 TRIPLES
23 PREDICATES
65 URIs
58 LITERALS
7 BLANK NODES