[PDF] Top 20 Capacity of Non-Malleable Codes
Has 10000 "Capacity of Non-Malleable Codes" found on our website. Below are the top 20 most common "Capacity of Non-Malleable Codes".
Capacity of Non-Malleable Codes
... code of rate arbitrarily close to 1 − α which is non-malleable w.r.t F with error exp(−Ω(n)). This significantly improves the probabilistic construction of [8], which achieves a rate close to (1 − α)/3 ... See full document
36
Upper and Lower Bounds for Continuous Non-Malleable Codes
... on Non-Malleable ...of non-malleable codes and their work has been instrumental in asserting the claims of efficient constructions for non-malleable codes since ... See full document
31
Non-Malleable Codes Against Bounded Polynomial Time Tampering
... However, while most cryptography implies non-trivial derandomization, there seem to be inherent barriers to statements of the converse form. In fact, the so-called “cryptographic” PRG’s yield, in two aspects, much ... See full document
30
Non-Malleable Codes for Partial Functions with Manipulation Detection
... Abstract. Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs (ICS ’10) and its main application is the protection of cryp- tographic devices against tampering attacks on ...on ... See full document
30
Continuously Non-Malleable Codes with Split-State Refresh
... Proof strategy. Although our construction shares similarities with previous work, our proof techniques diverge significantly from the ones in [33, 36]. The main trick of [36] is to show that given one half of the ... See full document
52
Information-theoretic Local Non-malleable Codes and their Applications
... correcting codes provide no guarantees for larger classes of tam- pering ...of non-malleable codes. Informally, non-malleable codes are codes such that for all ... See full document
26
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
... of non-malleable codes in the split-state setting (called continual non-malleable codes [24]) for their ...expensive non-malleable encoding scheme, while in our ... See full document
32
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
... (even malleable) implies a one-way function, which in turn imply string commitments in a black box way ...“tag-based” non-malleability [PR05b]. It should work with standard non-tag-based ... See full document
53
Optimal Computational Split-state Non-malleable Codes
... strong) non-malleable code into a rate-1, two-state, computational non- malleable ...such codes. Our compiler requires a stronger form of non-malleability, called aug- mented ... See full document
25
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
... strong non-malleable code as long as E is (i) a pseudorandom permutation under leakage and (ii) related-key secure with respect to an arbitrary but fixed key ...this non-malleable code very ... See full document
17
Non-malleable Reductions and Applications
... Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a use- ful message integrity guarantee in situations where traditional error-correction (and even error- detection) ... See full document
34
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
... of non-malleable codes and its ...the non-malleable code may be randomized and all of our generic theorems are stated for this ...of non-malleable codes, given in ... See full document
48
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
... [10] non-malleable schemes from chosen-plaintext secure ones, and Lin and Tessaro [37] show how the security of weakly chosen-ciphertext secure schemes can be ... See full document
37
Non-Malleable Secret Sharing
... detection(AMD) codes, and, error correcting or detecting codes in ...call non-malleable secret ...on non-malleable codes in the split-state model led to constructions ... See full document
45
Revisiting Non-Malleable Secret Sharing
... 0 non-malleable secret sharing scheme for threshold t = 2 would imply a 2-split-state non-malleable code with rate > 0 which is a major open ...3-split-state non-malleable ... See full document
57
Non-Malleable Secret Sharing for General Access Structures
... 2-out-of-2 non-malleable secret sharing (NMSS) is equivalent to non- malleable codes in the 2 split-state ...state non-malleable codes has proven to be surprisingly ... See full document
29
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
... is malleable; hence, we can instantiate our construction based on standard cryptographic as- sumptions, such as the existence of one-to-one one-way functions (which imply standard perfectly binding and ... See full document
30
Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
... on non-malleable codes in the information theoretic ...on non-malleable codes, and it is beyond the scope of this paper to provide a comprehensive survey of ...of ... See full document
37
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
... of non- malleable codes for doubly-exponential sized function ...inefficient non-malleable code ...such codes can achieve a rate close to 1, even for “small” function ... See full document
26
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
... explicit non- malleable code against a class of non-compartmentalized tampering ...natural non-compartmentalized class, non-malleable codes against this class have direct ... See full document
23
Related subjects