{"id":"https://openalex.org/W7154961114","doi":"https://doi.org/10.3390/cryptography10020027","title":"Polynomial Commitment Schemes from Classical Constructions to Post-Quantum Directions","display_name":"Polynomial Commitment Schemes from Classical Constructions to Post-Quantum Directions","publication_year":2026,"publication_date":"2026-04-20","ids":{"openalex":"https://openalex.org/W7154961114","doi":"https://doi.org/10.3390/cryptography10020027"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10020027","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020027","pdf_url":"https://www.mdpi.com/2410-387X/10/2/27/pdf?version=1776749468","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/2/27/pdf?version=1776749468","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006670759","display_name":"Maksim Iavich","orcid":"https://orcid.org/0000-0002-3109-7971"},"institutions":[{"id":"https://openalex.org/I223093266","display_name":"Caucasus University","ror":"https://ror.org/02tc4et63","country_code":"GE","type":"education","lineage":["https://openalex.org/I223093266"]}],"countries":["GE"],"is_corresponding":true,"raw_author_name":"Maksim Iavich","raw_affiliation_strings":["Department of Computer Science, Caucasus University, 0102 Tbilisi, Georgia"],"raw_orcid":"https://orcid.org/0000-0002-3109-7971","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Caucasus University, 0102 Tbilisi, Georgia","institution_ids":["https://openalex.org/I223093266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086525061","display_name":"Tamari Kuchukhidze","orcid":"https://orcid.org/0000-0003-1997-465X"},"institutions":[{"id":"https://openalex.org/I223093266","display_name":"Caucasus University","ror":"https://ror.org/02tc4et63","country_code":"GE","type":"education","lineage":["https://openalex.org/I223093266"]}],"countries":["GE"],"is_corresponding":false,"raw_author_name":"Tamari Kuchukhidze","raw_affiliation_strings":["Department of Computer Science, Caucasus University, 0102 Tbilisi, Georgia"],"raw_orcid":"https://orcid.org/0000-0003-1997-465X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Caucasus University, 0102 Tbilisi, Georgia","institution_ids":["https://openalex.org/I223093266"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068230542","display_name":"R\u0103zvan Bocu","orcid":"https://orcid.org/0000-0001-6577-1904"},"institutions":[{"id":"https://openalex.org/I3123573182","display_name":"Transylvania University of Bra\u0219ov","ror":"https://ror.org/01cg9ws23","country_code":"RO","type":"education","lineage":["https://openalex.org/I3123573182"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Razvan Bocu","raw_affiliation_strings":["Department of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Brasov, Romania"],"raw_orcid":"https://orcid.org/0000-0001-6577-1904","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Brasov, Romania","institution_ids":["https://openalex.org/I3123573182"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006670759"],"corresponding_institution_ids":["https://openalex.org/I223093266"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.82012102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"2","first_page":"27","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8529999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8529999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.06880000233650208,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.0203000009059906,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7127000093460083},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6432999968528748},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.5612000226974487},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4636000096797943},{"id":"https://openalex.org/keywords/falsifiability","display_name":"Falsifiability","score":0.4564000070095062},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44769999384880066}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7127000093460083},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6432999968528748},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.5612000226974487},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5360999703407288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48330000042915344},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4636000096797943},{"id":"https://openalex.org/C116222747","wikidata":"https://www.wikidata.org/wiki/Q220888","display_name":"Falsifiability","level":2,"score":0.4564000070095062},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44769999384880066},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.42570000886917114},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.36809998750686646},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3596000075340271},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.2563999891281128},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10020027","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020027","pdf_url":"https://www.mdpi.com/2410-387X/10/2/27/pdf?version=1776749468","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cb3f8823353f401eb3cf59d1ed8a50db","is_oa":true,"landing_page_url":"https://doaj.org/article/cb3f8823353f401eb3cf59d1ed8a50db","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 2, p 27 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10020027","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020027","pdf_url":"https://www.mdpi.com/2410-387X/10/2/27/pdf?version=1776749468","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7154961114.pdf","grobid_xml":"https://content.openalex.org/works/W7154961114.grobid-xml"},"referenced_works_count":61,"referenced_works":["https://openalex.org/W7678451","https://openalex.org/W35292054","https://openalex.org/W1561877077","https://openalex.org/W1723658598","https://openalex.org/W1837145606","https://openalex.org/W1909324101","https://openalex.org/W2007872832","https://openalex.org/W2038761522","https://openalex.org/W2043007983","https://openalex.org/W2137147061","https://openalex.org/W2166670067","https://openalex.org/W2168676717","https://openalex.org/W2473389213","https://openalex.org/W2496543269","https://openalex.org/W2604896010","https://openalex.org/W2883748642","https://openalex.org/W2898776076","https://openalex.org/W2913435035","https://openalex.org/W2914654142","https://openalex.org/W2915269496","https://openalex.org/W2954625838","https://openalex.org/W2965135529","https://openalex.org/W2969207949","https://openalex.org/W2982474429","https://openalex.org/W2984674716","https://openalex.org/W2989230924","https://openalex.org/W2990120385","https://openalex.org/W3015343560","https://openalex.org/W3023964980","https://openalex.org/W3037211059","https://openalex.org/W3126728199","https://openalex.org/W3164110928","https://openalex.org/W3193215470","https://openalex.org/W3197025878","https://openalex.org/W3201715140","https://openalex.org/W3209623239","https://openalex.org/W3213340422","https://openalex.org/W4205765479","https://openalex.org/W4289526974","https://openalex.org/W4290792026","https://openalex.org/W4294768166","https://openalex.org/W4309720964","https://openalex.org/W4312092354","https://openalex.org/W4312463145","https://openalex.org/W4312987944","https://openalex.org/W4312989341","https://openalex.org/W4313042292","https://openalex.org/W4313227231","https://openalex.org/W4365806595","https://openalex.org/W4365807481","https://openalex.org/W4365807618","https://openalex.org/W4367593152","https://openalex.org/W4386323387","https://openalex.org/W4395957665","https://openalex.org/W4401599157","https://openalex.org/W4406271161","https://openalex.org/W4407557071","https://openalex.org/W4409200120","https://openalex.org/W4413062507","https://openalex.org/W4417090548","https://openalex.org/W7076050069"],"related_works":[],"abstract_inverted_index":{"Polynomial":[0],"commitment":[1],"schemes":[2],"(PCS)":[3],"enable":[4],"a":[5,10,36,71,89,99,153,182,186],"prover":[6],"to":[7,9,41,53,63,164],"commit":[8],"polynomial":[11,193],"and":[12,30,60,65,84,104,131,148,161,171,185],"later":[13],"reveal":[14],"evaluations":[15],"with":[16,116,143,157],"succinct,":[17],"verifiable":[18],"proofs.":[19],"As":[20],"critical":[21],"components":[22],"of":[23,93,128],"modern":[24],"cryptographic":[25],"systems":[26],"like":[27],"Verkle":[28],"trees":[29],"zk-SNARKs,":[31],"these":[32],"methods":[33],"are":[34],"experiencing":[35],"significant":[37],"transition":[38,78],"from":[39,57],"classical":[40,106,172],"post-quantum":[42,67,120,192],"designs.":[43],"This":[44,179],"comprehensive":[45],"research":[46,137,155],"systematically":[47],"compares":[48],"the":[49,76,126,166],"major":[50],"scheme":[51],"families":[52],"examine":[54],"this":[55],"progression,":[56],"pairing-based":[58],"KZG":[59],"transparent":[61],"Bulletproofs":[62],"lattice-based":[64],"hash-based":[66],"alternatives.":[68],"We":[69,151],"present":[70],"unified":[72],"taxonomy":[73],"that":[74],"maps":[75],"classical-to-post-quantum":[77],"across":[79],"trust":[80],"models,":[81],"security":[82],"assumptions,":[83,112],"efficiency":[85,103],"measures":[86],"after":[87],"conducting":[88],"PRISMA-guided":[90],"systematic":[91],"review":[92],"77":[94],"works.":[95],"Our":[96],"analysis":[97],"reveals":[98],"fundamental":[100],"trade-off":[101],"between":[102,169],"security:":[105],"schemes,":[107],"which":[108],"rely":[109],"on":[110,175],"quantum-vulnerable":[111],"provide":[113],"optimal":[114],"performance":[115,167],"constant-sized":[117],"proofs,":[118],"while":[119],"alternatives":[121],"offer":[122,152],"quantum":[123],"resistance":[124],"at":[125],"cost":[127],"larger":[129],"proofs":[130],"higher":[132],"computational":[133],"overhead.":[134],"By":[135],"combining":[136],"works,":[138],"we":[139],"highlight":[140],"recurrent":[141],"problems":[142],"adaptive":[144],"security,":[145],"verification":[146],"efficiency,":[147],"proof":[149],"conciseness.":[150],"specific":[154],"roadmap":[156,188],"prioritized":[158],"short-,":[159],"medium-,":[160],"long-term":[162],"directions":[163],"close":[165],"gap":[168],"quantum-resistant":[170],"architectures":[173],"based":[174],"our":[176],"quantitative":[177],"analysis.":[178],"study":[180],"offers":[181],"technical":[183],"reference":[184],"strategic":[187],"for":[189],"constructing":[190],"practical":[191],"commitments.":[194]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-04-21T00:00:00"}
