Interactive Non-malleable Codes

被引:0
|
作者
Fleischhacker, Nils [1 ]
Goyal, Vipul [2 ]
Jain, Abhishek [3 ]
Paskin-Cherniavsky, Anat [4 ]
Radune, Slava [4 ,5 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Johns Hopkins Univ, Baltimore, MD USA
[4] Ariel Univ, Ariel, Israel
[5] Open Univ Israel, Raanana, Israel
来源
关键词
CAPACITY;
D O I
10.1007/978-3-030-36033-7_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-malleable codes (NMC) introduced by Dziembowski et al. [ICS'10] allow one to encode "passive" data in such a manner that when a codeword is tampered, the original data either remains completely intact or is essentially destroyed. In this work, we initiate the study of interactive non-malleable codes (INMCs) that allow for encoding "active communication" rather than passive data. An INMC allows two parties to engage in an interactive protocol such that an adversary who is able to tamper with the protocol messages either leaves the original transcript intact (i.e., the parties are able to reconstruct the original transcript) or the transcript is completely destroyed and replaced with an unrelated one. We formalize a tampering model for interactive protocols and put forward the notion of INMCs. Since constructing INMCs for general adversaries is impossible (as in the case of non-malleable codes), we construct INMCs for several specific classes of tampering functions. These include bounded state, split state, and fragmented sliding window tampering functions. We also obtain lower bounds for threshold tampering functions via a connection to interactive coding. All of our results are unconditional.
引用
收藏
页码:233 / 263
页数:31
相关论文
共 50 条
  • [1] Non-Malleable Codes
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    Wichs, Daniel
    JOURNAL OF THE ACM, 2018, 65 (04)
  • [2] Capacity of Non-Malleable Codes
    Cheraghchi, Mahdi
    Guruswami, Venkatesan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (03) : 1097 - 1118
  • [3] Continuous Non-malleable Codes
    Faust, Sebastian
    Mukherjee, Pratyay
    Nielsen, Jesper Buus
    Venturi, Daniele
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 465 - 488
  • [4] Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
    Li, Xin
    34TH COMPUTATIONAL COMPLEXITY CONFERENCE (CCC 2019), 2019, 137
  • [5] Improved Non-malleable Extractors, Non-malleable Codes and Independent Source Extractors
    Li, Xin
    STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 1144 - 1156
  • [6] Non-malleable Codes for Decision Trees
    Ball, Marshall
    Guo, Siyao
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 413 - 434
  • [7] Tamper Detection and Continuous Non-malleable Codes
    Jafargholi, Zahra
    Wichs, Daniel
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 451 - 480
  • [8] Leakage-Resilient Non-malleable Codes
    Aggarwal, Divesh
    Dziembowski, Stefan
    Kazana, Tomasz
    Obremski, Maciej
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 398 - 426
  • [9] Non-malleable Codes Against Lookahead Tampering
    Gupta, Divya
    Maji, Hemanta K.
    Wang, Mingyuan
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2018, 2018, 11356 : 307 - 328
  • [10] Privacy Amplification from Non-malleable Codes
    Chattopadhyay, Eshan
    Kanukurthi, Bhavana
    Obbattu, Sai Lakshmi Bhavana
    Sekar, Sruthi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 11898 : 318 - 337