{"id":"https://openalex.org/W2060985761","doi":"https://doi.org/10.1145/2810103.2813721","title":"Fast Non-Malleable Commitments","display_name":"Fast Non-Malleable Commitments","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2060985761","doi":"https://doi.org/10.1145/2810103.2813721","mag":"2060985761"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813721","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021208021","display_name":"Hai Brenner","orcid":null},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Hai Brenner","raw_affiliation_strings":["IDC, Herzliya, Israel","IDC Herzliya, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"IDC, Herzliya, Israel","institution_ids":["https://openalex.org/I138898306"]},{"raw_affiliation_string":"IDC Herzliya, Israel#TAB#","institution_ids":["https://openalex.org/I138898306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102383383","display_name":"Vipul Goyal","orcid":"https://orcid.org/0000-0003-2774-6892"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]},{"id":"https://openalex.org/I4210124949","display_name":"Microsoft Research (India)","ror":"https://ror.org/02w7f3w92","country_code":"IN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210124949"]}],"countries":["IN","US"],"is_corresponding":false,"raw_author_name":"Vipul Goyal","raw_affiliation_strings":["Microsoft Research, Bangalore, India","Microsoft Research, Bangalore, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Bangalore, India","institution_ids":["https://openalex.org/I4210124949"]},{"raw_affiliation_string":"Microsoft Research, Bangalore, India#TAB#","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034122024","display_name":"Silas Richelson","orcid":"https://orcid.org/0009-0005-1482-0338"},"institutions":[{"id":"https://openalex.org/I2799798094","display_name":"UCLA Health","ror":"https://ror.org/01d88se56","country_code":"US","type":"funder","lineage":["https://openalex.org/I2799798094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Silas Richelson","raw_affiliation_strings":["UCLA, Los Angeles, USA","UCLA, Los angeles, USA,"],"affiliations":[{"raw_affiliation_string":"UCLA, Los Angeles, USA","institution_ids":["https://openalex.org/I2799798094"]},{"raw_affiliation_string":"UCLA, Los angeles, USA,","institution_ids":["https://openalex.org/I2799798094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051186002","display_name":"Alon Rosen","orcid":"https://orcid.org/0000-0002-3021-7150"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Alon Rosen","raw_affiliation_strings":["IDC, Herzliya, Israel","IDC Herzliya, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"IDC, Herzliya, Israel","institution_ids":["https://openalex.org/I138898306"]},{"raw_affiliation_string":"IDC Herzliya, Israel#TAB#","institution_ids":["https://openalex.org/I138898306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080866144","display_name":"Margarita Vald","orcid":"https://orcid.org/0000-0003-1149-7182"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Margarita Vald","raw_affiliation_strings":["Tel Aviv University, Tel Aviv, Israel","Tel Aviv University, Tel Aviv, Israel,"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]},{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel,","institution_ids":["https://openalex.org/I16391192"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021208021"],"corresponding_institution_ids":["https://openalex.org/I138898306"],"apc_list":null,"apc_paid":null,"fwci":2.5887,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.91416826,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1048","last_page":"1057"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.7529754638671875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7436437010765076},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6359120607376099},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6281031370162964},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5762897729873657},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.567434549331665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5369242429733276},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5271256566047668},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5262524485588074},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5116170048713684},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.495190292596817},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.4665946960449219},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4545350670814514},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41282394528388977},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30971428751945496},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2115924060344696},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1829024851322174},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.17060163617134094},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.13285252451896667},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10686171054840088},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07535043358802795},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.07374894618988037}],"concepts":[{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.7529754638671875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7436437010765076},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6359120607376099},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6281031370162964},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5762897729873657},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.567434549331665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5369242429733276},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5271256566047668},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5262524485588074},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5116170048713684},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.495190292596817},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.4665946960449219},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4545350670814514},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41282394528388977},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30971428751945496},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2115924060344696},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1829024851322174},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.17060163617134094},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13285252451896667},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10686171054840088},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07535043358802795},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.07374894618988037},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813721","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G3519227077","display_name":null,"funder_award_id":"FP/2007-2013","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"},{"id":"https://openalex.org/G4939054164","display_name":null,"funder_award_id":"307952","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"},{"id":"https://openalex.org/G5244754482","display_name":null,"funder_award_id":"1255/12","funder_id":"https://openalex.org/F4320322252","funder_display_name":"Israel Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322252","display_name":"Israel Science Foundation","ror":"https://ror.org/04sazxf24"},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"},{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W126491009","https://openalex.org/W147290027","https://openalex.org/W195801986","https://openalex.org/W258132320","https://openalex.org/W319908677","https://openalex.org/W1499934958","https://openalex.org/W1517725369","https://openalex.org/W1567505539","https://openalex.org/W1575893707","https://openalex.org/W1576740425","https://openalex.org/W1591447685","https://openalex.org/W1882430379","https://openalex.org/W1975231058","https://openalex.org/W2004433870","https://openalex.org/W2006453614","https://openalex.org/W2012045293","https://openalex.org/W2015880590","https://openalex.org/W2027471022","https://openalex.org/W2042191289","https://openalex.org/W2051078457","https://openalex.org/W2052435632","https://openalex.org/W2052605513","https://openalex.org/W2064265141","https://openalex.org/W2065722310","https://openalex.org/W2077140897","https://openalex.org/W2088492763","https://openalex.org/W2090903439","https://openalex.org/W2093785875","https://openalex.org/W2095708839","https://openalex.org/W2098121410","https://openalex.org/W2102632861","https://openalex.org/W2108834246","https://openalex.org/W2109365902","https://openalex.org/W2113085788","https://openalex.org/W2123783718","https://openalex.org/W2134340933","https://openalex.org/W2136530453","https://openalex.org/W2204895368","https://openalex.org/W2246792095","https://openalex.org/W2505944591","https://openalex.org/W2561675875","https://openalex.org/W2990399857"],"related_works":["https://openalex.org/W2885411824","https://openalex.org/W3209695433","https://openalex.org/W2091303115","https://openalex.org/W2164478452","https://openalex.org/W2536560298","https://openalex.org/W2770115308","https://openalex.org/W4312092305","https://openalex.org/W2611320502","https://openalex.org/W3175243239","https://openalex.org/W2185385784"],"abstract_inverted_index":{"The":[0],"notion":[1],"of":[2,38,43,60,71,101,107,114,124],"non-malleability":[3],"in":[4,20,32,55,73,110,144],"cryptography":[5],"refers":[6],"to":[7,28,34,52,117,136,153],"the":[8,11,36,74,79,108,111,129,151],"setting":[9],"where":[10],"adversary":[12],"is":[13,92,121],"a":[14,68,93,103,122],"man-in-the-middle":[15],"(MIM)":[16],"who":[17],"takes":[18],"part":[19],"two":[21,41],"or":[22],"more":[23],"protocol":[24],"executions":[25],"and":[26],"tries":[27],"use":[29],"information":[30],"obtained":[31],"one,":[33],"violate":[35],"security":[37],"another.":[39],"Despite":[40],"decades":[42],"research,":[44],"non-malleable":[45],"commitments":[46],"(NMCs)":[47],"have":[48],"remained":[49],"too":[50],"inefficient":[51],"be":[53,99],"implemented":[54],"practice,":[56],"without":[57],"some":[58],"sort":[59],"trusted":[61],"setup.":[62],"In":[63,146],"this":[64],"work,":[65],"we":[66],"give":[67],"fast":[69],"implementation":[70],"NMC":[72,95],"plain":[75],"model,":[76],"based":[77,155],"on":[78,156],"DDH":[80],"assumption":[81],"being":[82],"hard":[83],"over":[84,141],"elliptic":[85],"curve":[86],"groups.":[87],"Our":[88],"main":[89],"theoretical":[90],"result":[91],"new":[94,132],"scheme":[96],"which":[97],"can":[98],"thought":[100],"as":[102],"\"high":[104],"dimensional\"":[105],"generalization":[106],"one":[109],"recent":[112],"work":[113,149],"[GRRV14].":[115,145],"Central":[116],"our":[118,148],"efficiency":[119],"improvements":[120],"method":[123],"constraining":[125],"challenges":[126],"sent":[127],"by":[128],"receiver.":[130],"This":[131],"approach":[133],"enables":[134],"us":[135],"obtain":[137],"dramatically":[138],"improved":[139],"parameters":[140],"those":[142],"suggested":[143],"particular,":[147],"opens":[150],"door":[152],"implementations":[154],"Elliptic":[157],"Curves.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
