Algebraic Restriction Codes and Their Applications

被引:0
|
作者
Aggarwal, Divesh [1 ]
Doettling, Nico [2 ]
Dujmovic, Jesko [2 ,3 ]
Hajiabadi, Mohammad [4 ]
Malavolta, Giulio [5 ]
Obremski, Maciej [1 ]
机构
[1] Natl Univ Singapore, Queenstown, Singapore
[2] Helmholtz Ctr Informat Secur CISPA, Saarbrucken, Saarland, Germany
[3] Saarbrucken Grad Sch Comp Sci, Saarbrucken, Saarland, Germany
[4] Univ Waterloo, Waterloo, ON, Canada
[5] Bocconi Univ, Milan, Lombardy, Italy
关键词
Algebraic restriction codes; Oblivious transfer; Rate; 1; Statistically sender private; OT; Diffie-Hellman; DDH; OBLIVIOUS TRANSFER;
D O I
10.1007/s00453-023-01150-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Consider the following problem: You have a device that is supposed to compute a linear combination of its inputs, which are taken from some finite field. However, the device may be faulty and compute arbitrary functions of its inputs. Is it possible to encode the inputs in such a way that only linear functions can be evaluated over the encodings? I.e., learning an arbitrary function of the encodings will not reveal more information about the inputs than a linear combination. In this work, we introduce the notion of algebraic restriction codes (AR codes), which constrain adversaries who might compute any function to computing a linear function. Our main result is an information-theoretic construction AR codes that restrict any class of function with a bounded number of output bits to linear functions. Our construction relies on a seed which is not provided to the adversary. While interesting and natural on its own, we show an application of this notion in cryptography. In particular, we show that AR codes lead to the first construction of rate-1 oblivious transfer with statistical sender security from the Decisional Diffie-Hellman assumption, and the first-ever construction that makes black-box use of cryptography. Previously, such protocols were known only from the LWE assumption, using non-black-box cryptographic techniques. We expect our new notion of AR codes to find further applications, e.g., in the context of non-malleability, in the future.
引用
收藏
页码:3602 / 3648
页数:47
相关论文
共 50 条
  • [21] Algebraic structure of quasicyclic codes
    Lally, K
    Fitzpatrick, P
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 196 - 196
  • [22] ALGEBRAIC STRUCTURE OF CONVOLUTIONAL CODES
    FORNEY, GD
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1970, 16 (01) : 115 - +
  • [23] ALGEBRAIC DECODING OF GOPPA CODES
    PATTERSON, NJ
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1975, 21 (02) : 203 - 207
  • [24] Algebraic codes for network coding
    Gabidulin, E. M.
    Bossert, M.
    PROBLEMS OF INFORMATION TRANSMISSION, 2009, 45 (04) : 343 - 356
  • [25] Testing algebraic geometric codes
    CHEN Hao Software Engineering Institute
    Science China Mathematics, 2009, (10) : 2171 - 2176
  • [26] Algebraic structure of quasicyclic codes
    Lally, K
    Fitzpatrick, P
    DISCRETE APPLIED MATHEMATICS, 2001, 111 (1-2) : 157 - 175
  • [27] Algebraic manipulation detection codes
    Cramer, Ronald
    Fehr, Serge
    Padro, Carles
    SCIENCE CHINA-MATHEMATICS, 2013, 56 (07) : 1349 - 1358
  • [28] An Introduction to Algebraic Geometry Codes
    Munuera, Carlos
    Olaya-Leon, Wilson
    ALGEBRA FOR SECURE AND RELIABLE COMMUNICATION MODELING, 2015, 642 : 87 - 117
  • [29] Algebraic manipulation detection codes
    Ronald Cramer
    Serge Fehr
    Carles Padró
    Science China Mathematics, 2013, 56 : 1349 - 1358
  • [30] Testing algebraic geometric codes
    Hao Chen
    Science in China Series A: Mathematics, 2009, 52 : 2171 - 2176