Four-State Non-malleable Codes with Explicit Constant Rate

被引:23
|
作者
Kanukurthi, Bhavana [1 ]
Obbattu, Sai Lakshmi Bhavana [1 ]
Sekar, Sruthi [2 ]
机构
[1] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore, Karnataka, India
[2] Indian Inst Sci, Dept Math, Bangalore, Karnataka, India
来源
关键词
FUZZY EXTRACTORS; RANDOMNESS;
D O I
10.1007/978-3-319-70503-3_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-malleable codes (NMCs), introduced by Dziembowski, Pietrzak and Wichs (ITCS 2010), generalize the classical notion of error correcting codes by providing a powerful guarantee even in scenarios where error correcting codes cannot provide any guarantee: a decoded message is either the same or completely independent of the underlying message, regardless of the number of errors introduced into the codeword. Informally, NMCs are defined with respect to a family of tampering functions F and guarantee that any tampered codeword either decodes to the same message or to an independent message, so long as it is tampered using a function f is an element of F. Nearly all known constructions of NMCs are for the t-split-state family, where the adversary tampers each of the t "states" of a codeword, arbitrarily but independently. Cheraghchi and Guruswami (TCC 2014) obtain a Rate-1 non-malleable code for the case where t = O(n) with n being the codeword length and, in (ITCS 2014), show an upper bound of 1 - 1/t on the best achievable rate for any t-split state NMC. For t = 10, Chattopadhyay and Zuckerman (FOCS 2014) achieve a constant rate construction where the constant is unknown. In summary, there is no known construction of an NMC with an explicit constant rate for any t = o(n), let alone one that comes close to matching Cheraghchi and Guruswami's lowerbound! In this work, we construct an efficient non-malleable code in the t-split-state model, for t = 4, that achieves a constant rate of 1/3+zeta, for any constant zeta > 0, and error 2(-Omega(l/logc+1l)), where l is the length of the message and c > 0 is a constant.
引用
收藏
页码:344 / 375
页数:32
相关论文
共 50 条
  • [31] Inception Makes Non-malleable Codes Stronger
    Aggarwal, Divesh
    Kazana, Tomasz
    Obremski, Maciej
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 319 - 343
  • [32] Non-malleable Codes from Additive Combinatorics
    Aggarwal, Divesh
    Dodis, Yevgeniy
    Lovett, Shachar
    STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, : 774 - 783
  • [33] Non-Malleable Codes for Space-Bounded Tampering
    Faust, Sebastian
    Hostakova, Kristina
    Mukherjee, Pratyay
    Venturi, Daniele
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 95 - 126
  • [34] Non-Malleable Codes for Partial Functions with Manipulation Detection
    Kiayias, Aggelos
    Liu, Feng-Hao
    Tselekounis, Yiannis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 577 - 607
  • [35] Non-Malleable Codes for Small-Depth Circuits
    Ball, Marshall
    Dachman-Soled, Dana
    Guo, Siyao
    Malkin, Tal
    Tan, Li-Yang
    2018 IEEE 59TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2018, : 826 - 837
  • [36] Locally Decodable and Updatable Non-malleable Codes and Their Applications
    Dachman-Soled, Dana
    Liu, Feng-Hao
    Shi, Elaine
    Zhou, Hong-Sheng
    JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 319 - 355
  • [37] Non-malleable Extractors and Codes, with Their Many Tampered Extensions
    Chattopadhyay, Eshan
    Goyal, Vipul
    Li, Xin
    STOC'16: PROCEEDINGS OF THE 48TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2016, : 285 - 298
  • [38] Locally Decodable and Updatable Non-malleable Codes and Their Applications
    Dachman-Soled, Dana
    Liu, Feng-Hao
    Shi, Elaine
    Zhou, Hong-Sheng
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 427 - 450
  • [39] Local Non-malleable Codes in the Bounded Retrieval Model
    Dachman-Soled, Dana
    Kulkarni, Mukul
    Shahverdi, Aria
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 281 - 311
  • [40] Locally Decodable and Updatable Non-malleable Codes and Their Applications
    Dana Dachman-Soled
    Feng-Hao Liu
    Elaine Shi
    Hong-Sheng Zhou
    Journal of Cryptology, 2020, 33 : 319 - 355