• No results found

[PDF] Top 20 Capacity of Non-Malleable Codes

Has 10000 "Capacity of Non-Malleable Codes" found on our website. Below are the top 20 most common "Capacity of Non-Malleable Codes".

Capacity  of  Non-Malleable  Codes

Capacity of Non-Malleable Codes

... code of rate arbitrarily close to 1 − α which is non-malleable w.r.t F with error exp(−Ω(n)). This significantly improves the probabilistic construction of [8], which achieves a rate close to (1 − α)/3 ... See full document

36

Upper   and  Lower  Bounds  for  Continuous  Non-Malleable  Codes

Upper and Lower Bounds for Continuous Non-Malleable Codes

... on Non-Malleable ...of non-malleable codes and their work has been instrumental in asserting the claims of efficient constructions for non-malleable codes since ... See full document

31

Non-Malleable  Codes  Against  Bounded  Polynomial  Time  Tampering

Non-Malleable Codes Against Bounded Polynomial Time Tampering

... However, while most cryptography implies non-trivial derandomization, there seem to be inherent barriers to statements of the converse form. In fact, the so-called “cryptographic” PRG’s yield, in two aspects, much ... See full document

30

Non-Malleable  Codes  for  Partial  Functions  with  Manipulation  Detection

Non-Malleable Codes for Partial Functions with Manipulation Detection

... Abstract. Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs (ICS ’10) and its main application is the protection of cryp- tographic devices against tampering attacks on ...on ... See full document

30

Continuously  Non-Malleable  Codes  with  Split-State  Refresh

Continuously Non-Malleable Codes with Split-State Refresh

... Proof strategy. Although our construction shares similarities with previous work, our proof techniques diverge significantly from the ones in [33, 36]. The main trick of [36] is to show that given one half of the ... See full document

52

Information-theoretic  Local  Non-malleable  Codes   and  their  Applications

Information-theoretic Local Non-malleable Codes and their Applications

... correcting codes provide no guarantees for larger classes of tam- pering ...of non-malleable codes. Informally, non-malleable codes are codes such that for all ... See full document

26

Locally  Decodable   and  Updatable  Non-Malleable  Codes   and  Their  Applications

Locally Decodable and Updatable Non-Malleable Codes and Their Applications

... of non-malleable codes in the split-state setting (called continual non-malleable codes [24]) for their ...expensive non-malleable encoding scheme, while in our ... See full document

32

Explicit  Non-malleable  Codes  Resistant  to  Permutations   and  Perturbations

Explicit Non-malleable Codes Resistant to Permutations and Perturbations

... (even malleable) implies a one-way function, which in turn imply string commitments in a black box way ...“tag-based” non-malleability [PR05b]. It should work with standard non-tag-based ... See full document

53

Optimal  Computational  Split-state  Non-malleable  Codes

Optimal Computational Split-state Non-malleable Codes

... strong) non-malleable code into a rate-1, two-state, computational non- malleable ...such codes. Our compiler requires a stronger form of non-malleability, called aug- mented ... See full document

25

Short  Non-Malleable  Codes  from  Related-Key  Secure  Block  Ciphers

Short Non-Malleable Codes from Related-Key Secure Block Ciphers

... strong non-malleable code as long as E is (i) a pseudorandom permutation under leakage and (ii) related-key secure with respect to an arbitrary but fixed key ...this non-malleable code very ... See full document

17

Non-malleable  Reductions   and  Applications

Non-malleable Reductions and Applications

... Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a use- ful message integrity guarantee in situations where traditional error-correction (and even error- detection) ... See full document

34

Non-Malleable  Codes  from  Average-Case  Hardness:  AC0,  Decision  Trees,   and  Streaming  Space-Bounded  Tampering

Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering

... of non-malleable codes and its ...the non-malleable code may be randomized and all of our generic theorems are stated for this ...of non-malleable codes, given in ... See full document

48

From  Single-Bit  to  Multi-Bit  Public-Key  Encryption  via  Non-Malleable  Codes

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes

... [10] non-malleable schemes from chosen-plaintext secure ones, and Lin and Tessaro [37] show how the security of weakly chosen-ciphertext secure schemes can be ... See full document

37

Non-Malleable  Secret  Sharing

Non-Malleable Secret Sharing

... detection(AMD) codes, and, error correcting or detecting codes in ...call non-malleable secret ...on non-malleable codes in the split-state model led to constructions ... See full document

45

Revisiting  Non-Malleable  Secret  Sharing

Revisiting Non-Malleable Secret Sharing

... 0 non-malleable secret sharing scheme for threshold t = 2 would imply a 2-split-state non-malleable code with rate > 0 which is a major open ...3-split-state non-malleable ... See full document

57

Non-Malleable  Secret  Sharing  for  General  Access  Structures

Non-Malleable Secret Sharing for General Access Structures

... 2-out-of-2 non-malleable secret sharing (NMSS) is equivalent to non- malleable codes in the 2 split-state ...state non-malleable codes has proven to be surprisingly ... See full document

29

Continuously  Non-Malleable  Codes  in  the  Split-State  Model  from  Minimal  Assumptions

Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions

... is malleable; hence, we can instantiate our construction based on standard cryptographic as- sumptions, such as the existence of one-to-one one-way functions (which imply standard perfectly binding and ... See full document

30

Non-Malleable  Codes,  Extractors   and  Secret  Sharing  for  Interleaved  Tampering   and  Composition  of  Tampering

Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering

... on non-malleable codes in the information theoretic ...on non-malleable codes, and it is beyond the scope of this paper to provide a comprehensive survey of ...of ... See full document

37

Efficient  Non-Malleable  Codes   and  Key-Derivation  for  Poly-Size  Tampering  Circuits

Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits

... of non- malleable codes for doubly-exponential sized function ...inefficient non-malleable code ...such codes can achieve a rate close to 1, even for “small” function ... See full document

26

A  Rate-Optimizing  Compiler  for  Non-malleable  Codes  Against  Bit-wise  Tampering   and  Permutations

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations

... explicit non- malleable code against a class of non-compartmentalized tampering ...natural non-compartmentalized class, non-malleable codes against this class have direct ... See full document

23

Show all 10000 documents...