2018
DOI: 10.1007/978-3-319-96878-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Non-Malleable Codes for Partial Functions with Manipulation Detection

Abstract: Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs (ICS '10) and its main application is the protection of cryptographic devices against tampering attacks on memory. In this work, we initiate a comprehensive study on non-malleable codes for the class of partial functions, that read/write on an arbitrary subset of codeword bits with specific cardinality. Our constructions are efficient in terms of information rate, while allowing the attacker to access asymptotically almost the entire codewo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…if they introduce any forks or non-linearity in their responses). Finally, [39,40,60], protect hardware memory against active attacks, while [38,6], protect cryptographic hardware against tampering and Trojan injection attacks, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…if they introduce any forks or non-linearity in their responses). Finally, [39,40,60], protect hardware memory against active attacks, while [38,6], protect cryptographic hardware against tampering and Trojan injection attacks, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Several constructions of non-malleable codes in the split-state model appeared in the literature, both for the information-theoretic [32,31,3,20,4,2,14,5,48,49,17] and computational setting [50,36,24,1,46,52,23]. Non-malleable codes exist also for several other models besides split-state tampering, including bit-wise independent tampering and permutations [20,6,7,22,21], circuits of polynomial size [32,19,38,39], constant-state tampering [18], block-wise tampering [13], space-bounded algorithms [35,9], bounded-depth circuits [8,16], and partial functions [47].…”
Section: Further Related Workmentioning
confidence: 99%
“…Several constructions of non-malleable codes in the split-state model appeared in the literature, both for the information-theoretic [32,31,3,20,4,2,14,5,48,49,17] and computational setting [50,36,24,1,46,52,23]. Non-malleable codes exist also for several other models besides split-state tampering, including bit-wise independent tampering and permutations [20,6,7,22,21], circuits of polynomial size [32,19,38,39], constant-state tampering [18], block-wise tampering [13], space-bounded algorithms [35,9], bounded-depth circuits [8,16], and partial functions [47].…”
Section: Further Related Workmentioning
confidence: 99%