2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS) 2018
DOI: 10.1109/focs.2018.00083
|View full text |Cite
|
Sign up to set email alerts
|

Non-Malleable Codes for Small-Depth Circuits

Abstract: We construct efficient, unconditional non-malleable codes that are secure against tampering functions computed by small-depth circuits. For constant-depth circuits of polynomial size (i.e. AC 0 tampering functions), our codes have codeword length n = k 1+o(1) for a k-bit message. This is an exponential improvement of the previous best construction due to Chattopadhyay and Li (STOC 2017), which had codeword length 2 O( √ k) . Our construction remains efficient for circuit depths as large as Θ(log(n)/ log log(n)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 44 publications
0
18
0
Order By: Relevance
“…The main building block of the ZK-preserving alphabet reduction is an encoding scheme with equivocation properties called Reconstructable Probabilistic Encoding (RPE) [ 34 , 35 , 36 , 37 ]. In this section, we formally define these objects.…”
Section: The Zk-pcps Of Hazay Et Al: Zk From Lr Encodingsmentioning
confidence: 99%
See 3 more Smart Citations
“…The main building block of the ZK-preserving alphabet reduction is an encoding scheme with equivocation properties called Reconstructable Probabilistic Encoding (RPE) [ 34 , 35 , 36 , 37 ]. In this section, we formally define these objects.…”
Section: The Zk-pcps Of Hazay Et Al: Zk From Lr Encodingsmentioning
confidence: 99%
“…This gives an efficient reconstructor . We note that the final ZK-PCP construction will use an explicit RPE construction due to [ 37 , 39 ].…”
Section: The Zk-pcps Of Hazay Et Al: Zk From Lr Encodingsmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, non-malleable codes in the split-state model have found many applications in the construction of non-malleable codes against other important and natural tampering families, as mentioned below: Decision tree tampering ([ 46 ]): each tampered output symbol is a function of a small polynomial number of (adaptively chosen) queries to codeword symbols. Small-depth circuit tampering ([ 46 , 47 ]): the tampered codeword is produced by a boolean circuit of polynomial size and nearly logarithmic depth. (Bounded) Polynomial-size circuit tampering ([ 48 ]): the tampered codeword is produced by circuit of bounded polynomial size, for some constant d , where n is the codeword length.…”
Section: Introductionmentioning
confidence: 99%