2018
DOI: 10.1007/978-3-319-93387-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Continuously Non-malleable Codes with Split-State Refresh

Abstract: Non-malleable codes for the split-state model allow to encode a message into two parts, such that arbitrary independent tampering on each part, and subsequent decoding of the corresponding modified codeword, yields either the same as the original message, or a completely unrelated value. Continuously non-malleable codes further allow to tolerate an unbounded (polynomial) number of tampering attempts, until a decoding error happens. The drawback is that, after an error happens, the system must self-destruct and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…In this paper, we focus only on the "default flavor" of continuous non-malleability. This in contrast to previous work on continuously nonmalleable codes (except [20,19,28]), which instead by default considered continuous super non-malleability. While the notion we consider is strictly weaker than continuous strong or super non-malleability, to the best of our knowledge, it is sufficient for all known applications of continuously non-malleable codes, in particular [30,31,20,19,28].…”
Section: Continuous Non-malleabilitymentioning
confidence: 88%
See 2 more Smart Citations
“…In this paper, we focus only on the "default flavor" of continuous non-malleability. This in contrast to previous work on continuously nonmalleable codes (except [20,19,28]), which instead by default considered continuous super non-malleability. While the notion we consider is strictly weaker than continuous strong or super non-malleability, to the best of our knowledge, it is sufficient for all known applications of continuously non-malleable codes, in particular [30,31,20,19,28].…”
Section: Continuous Non-malleabilitymentioning
confidence: 88%
“…The only known constructions of a CNMC in the split-state model (therefore also achieving message uniqueness) are the codes of [30,28], but unfortunately these constructions rely on both trusted setup and strong computational assumptions. Indeed such codes require: (i) a "common reference string", i.e., the existence of a honestly generated string (with some given distribution) that is assumed to be untamperable, and that is available to the encoding and decoding functions, and to the adversary; (ii) the existence of non-interactive zeroknowledge proofs and either collision-resistant hash functions [30] or public-key encryption resilient to continual leakage [24,28] (which we only know how to obtain under concrete number-theoretic assumptions over bi-linear groups). 8 Since [30] by default considered continuous super non-malleability, they require an even stronger form of uniqueness called codeword uniqueness, which intuitively says that it should be hard to find (c0, c1,c1) such that both (c0, c1) and (c0,c1) are valid, and c1 =c1, even if the two codewords encode the same message.…”
Section: Continuous Non-malleabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Similar limitations have been considered before in the literature to circumvent impossibility results, in particular in the so called split-state model [DPW18]. Several constructions have been proposed in this model including: non-malleable codes (Dziembowski, Pietrzak and Wichs [DPW18]), signature schemes (Faonio et al [FNSV18]), and more (Liu and Lysyanskaya [LL12]).…”
Section: Related Workmentioning
confidence: 91%
“…The compiler from LRREs to CNMREs is very similar to the original construction of CNMC of [33], and its proof of security follows a proof technique similar to [14,29,32]. Our LRREs are inspired by the leakage-resilient storage of Davi, Dziembowski and Venturi [18] based on the inner-product extractor (see also Dziembowski and Faust [21]).…”
Section: Technical Overviewmentioning
confidence: 99%