2015
DOI: 10.1007/978-3-662-49099-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Information-Theoretic Local Non-malleable Codes and Their Applications

Abstract: Error correcting codes, though powerful, are only applicable in scenarios where the adversarial channel does not introduce "too many" errors into the codewords. Yet, the question of having guarantees even in the face of many errors is well-motivated. Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), address precisely this question. Such codes guarantee that even if an adversary completely over-writes the codeword, he cannot transform it into a codeword for a related message. Not on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 31 publications
0
14
0
Order By: Relevance
“…In fact, the commitments produced by the tampering functions could play an important role for the success of the adversary! This issue will be resolved by additionally assuming that the inner NMC be a leakage-resilient NMC, 13 which allows us to obtain (via a leakage query) the modified commitment as generated by the tampering functions (φ 0 , φ 1 ) chosen by the adversary. As we show, this leakage can be used by the distinguisher of the inner auxiliary NMC to simulate consistently the view of the distinguisher attacking the full code, thus reaching a contradiction.…”
Section: Positive Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In fact, the commitments produced by the tampering functions could play an important role for the success of the adversary! This issue will be resolved by additionally assuming that the inner NMC be a leakage-resilient NMC, 13 which allows us to obtain (via a leakage query) the modified commitment as generated by the tampering functions (φ 0 , φ 1 ) chosen by the adversary. As we show, this leakage can be used by the distinguisher of the inner auxiliary NMC to simulate consistently the view of the distinguisher attacking the full code, thus reaching a contradiction.…”
Section: Positive Resultsmentioning
confidence: 99%
“…The typical application of non-malleable codes is the protection of cryptographic algorithms from tampering attacks against the memory [27,38,30]. Non-malleable codes were also used to protect arbitrary computations (and not only storage) against tampering [22,31,13].…”
Section: Additional Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several constructions of non-malleable codes in the split-state model appeared in the literature, both for the information-theoretic [32,31,3,20,4,2,14,5,48,49,17] and computational setting [50,36,24,1,46,52,23]. Non-malleable codes exist also for several other models besides split-state tampering, including bit-wise independent tampering and permutations [20,6,7,22,21], circuits of polynomial size [32,19,38,39], constant-state tampering [18], block-wise tampering [13], space-bounded algorithms [35,9], bounded-depth circuits [8,16], and partial functions [47].…”
Section: Further Related Workmentioning
confidence: 99%
“…Lemma 16. For all PPT adversaries A there exists a negligible function ν 13,14 : N → [0, 1] such that P G 13 A (κ) = 1 = P G 14 A (κ) = 1 ≤ ν 13,14 (κ). Proof.…”
Section: Output the Same As A Doesmentioning
confidence: 99%