A constant rate non-malleable code in the split-state model

Author(s):  
Divesh Aggarwal ◽  
Maciej Obremski
Author(s):  
Hao Xiong ◽  
Cong Zhang ◽  
Tsz Hon Yuen ◽  
Echo P. Zhang ◽  
Siu Ming Yiu ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-8
Author(s):  
Yi Zhao ◽  
Kaitai Liang ◽  
Bo Yang ◽  
Liqun Chen

In leakage resilient cryptography, there is a seemingly inherent restraint on the ability of the adversary that it cannot get access to the leakage oracle after the challenge. Recently, a series of works made a breakthrough to consider a postchallenge leakage. They presented achievable public key encryption (PKE) schemes which are semantically secure against after-the-fact leakage in the split-state model. This model puts a more acceptable constraint on adversary’s ability that the adversary cannot query the leakage of secret states as a whole but the functions of several parts separately instead of prechallenge query only. To obtain security against chosen ciphertext attack (CCA) for PKE schemes against after-the-fact leakage attack (AFL), existing works followed the paradigm of “double encryption” which needs noninteractive zero knowledge (NIZK) proofs in the encryption algorithm. We present an alternative way to achieve AFL-CCA security via lossy trapdoor functions (LTFs) without NIZK proofs. First, we formalize the definition of LTFs secure against AFL (AFLR-LTFs) and all-but-one variants (ABO). Then, we show how to realize this primitive in the split-state model. This primitive can be used to construct AFLR-CCA secure PKE scheme in the same way as the method of “CCA from LTFs” in traditional sense.


2020 ◽  
Vol 33 (4) ◽  
pp. 2034-2077
Author(s):  
Sebastian Faust ◽  
Pratyay Mukherjee ◽  
Jesper Buus Nielsen ◽  
Daniele Venturi

Abstract Non-malleable codes (Dziembowski et al., ICS’10 and J. ACM’18) are a natural relaxation of error correcting/detecting codes with useful applications in cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a message can only leave it unchanged or modify it to the encoding of an unrelated value. This paper introduces continuous non-malleability, a generalization of standard non-malleability where the adversary is allowed to tamper continuously with the same encoding. This is in contrast to the standard definition of non-malleable codes, where the adversary can only tamper a single time. The only restriction is that after the first invalid codeword is ever generated, a special self-destruct mechanism is triggered and no further tampering is allowed; this restriction can easily be shown to be necessary. We focus on the split-state model, where an encoding consists of two parts and the tampering functions can be arbitrary as long as they act independently on each part. Our main contributions are outlined below. We show that continuous non-malleability in the split-state model is impossible without relying on computational assumptions. We construct a computationally secure split-state code satisfying continuous non-malleability in the common reference string (CRS) model. Our scheme can be instantiated assuming the existence of collision-resistant hash functions and (doubly enhanced) trapdoor permutations, but we also give concrete instantiations based on standard number-theoretic assumptions. We revisit the application of non-malleable codes to protecting arbitrary cryptographic primitives against related-key attacks. Previous applications of non-malleable codes in this setting required perfect erasures and the adversary to be restricted in memory. We show that continuously non-malleable codes allow to avoid these restrictions.


Author(s):  
Eiichiro FUJISAKI ◽  
Akinori KAWACHI ◽  
Ryo NISHIMAKI ◽  
Keisuke TANAKA ◽  
Kenji YASUNAGA

Author(s):  
Divesh Aggarwal ◽  
Nico Döttling ◽  
Jesper Buus Nielsen ◽  
Maciej Obremski ◽  
Erick Purwanto
Keyword(s):  

Author(s):  
Rafail Ostrovsky ◽  
Giuseppe Persiano ◽  
Daniele Venturi ◽  
Ivan Visconti
Keyword(s):  

1950 ◽  
Vol 22 (7) ◽  
pp. 956-956 ◽  
Author(s):  
Lester Lundsted
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document