[PDF] Top 20 Non-Malleable Codes for Partial Functions with Manipulation Detection
Has 10000 "Non-Malleable Codes for Partial Functions with Manipulation Detection" found on our website. Below are the top 20 most common "Non-Malleable Codes for Partial Functions with Manipulation Detection".
Non-Malleable Codes for Partial Functions with Manipulation Detection
... Security against memory tampering - (Logarithmic length alphabets, no CRS). In modern architectures data is stored and transmitted in chunks, thus our block-wise encoding scheme can provide tamper-resilience in all these ... See full document
30
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
... efficient codes, such that, with overwhelming probability, a random member of the family is non-malleable ...hash functions H. This result already shows the existence of efficient ... See full document
26
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
... Non-malleable codes. Only a few constructions of continuously non-malleable codes are known (besides the already mentioned constructions of ...continuous non-malleability ... See full document
30
Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
... any non-malleable code in the 2-split-state model gives a 2 out of 2 secret sharing scheme, if one views the two split states as two shares ...any non-malleable code in the interleaved 2-split ... See full document
37
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
... (even malleable) implies a one-way function, which in turn imply string commitments in a black box way ...“tag-based” non-malleability [PR05b]. It should work with standard non-tag-based ... See full document
53
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
... a partial transcript ρ of H b 0 (n, z) up until the end of Stage 1 of the left session such that under the condition that a prefix of the transcript is ρ , both of the above (i) and (ii) ... See full document
38
Non-malleable Randomness Encoders and their Applications
... introduce Non-malleable Randomness ...ing non-malleable encoding C. The non-malleability is, as for standard NMCs, defined with respect to F , a family of tampering ...any non- ... See full document
30
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
... (ρ-LLR-AMD) codes where the adversary has some partial information about the codeword c before choosing A, and the scheme is secure even conditioned on this partial ... See full document
14
Inception Makes Non-malleable Codes Stronger
... super non-malleability of (Enc, Dec) to conclude super-strong non-malleability of the modified encoding scheme, we need to do rejection sampling to ensure that the codeword is valid with re- spect to the ... See full document
26
Privacy Amplification from Non-malleable Codes
... is Non-malleable codes, which were introduced in the work of Dziembowski, Pietrzak and Wichs ...two functions f and g, each acting independently on L and R ...any non-malleable ... See full document
37
Non-malleable Reductions and Applications
... Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a useful message integrity guarantee in situations where traditional error-correction (and even ... See full document
34
Non-Malleable Codes for Small-Depth Circuits
... A non-malleable reduction (E, D) reducing DNF-tampering to (leaky) local-tampering needs to satisfy two conditions (i) Pr[D(E(x)) = x] = 1 for any x and, (ii) D ◦ f ◦ E is a distribution over (leaky) local ... See full document
26
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
... tampering functions f ∈ AC 0 in general, since AC 0 contains all poly- size and constant depth circuit families, but rather provides tamper resilience against specific families in AC 0 (ACC 0 , ... See full document
48
Explicit Non-Malleable Codes Resistant to Permutations
... that non-malleable codes can be useful in obtaining tamper-proof security as ...as functions from the allowed class of tampering-function f ∈ F ...a non-malleable code secure ... See full document
48
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
... tampering functions being “compartmentalized” — ...explicit non- malleable code against a class of non-compartmentalized tampering ...of functions which can permute the bits of a ... See full document
23
Non-malleable Codes against Lookahead Tampering
... of non-malleable codes that provide a useful message integrity for such ...a non-malleable code ensures that the tampered codeword encodes the original message or a message that is ... See full document
33
A constant-rate non-malleable code in the split-state model.
... a non-malleable code against the tampering family G containing 2-lookahead tampering functions and forgetful tampering ...a non-malleable reduction from the 2-split tampering family to ... See full document
28
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
... using non-malleable codes – instead of storing the secret (in the clear) on a device, one instead stores an encoding of the ...the non-malleable code guarantees that the adversary ... See full document
32
Capacity of Non-Malleable Codes
... of non-malleable codes of rate close to 1 (with polynomial time encoding and decoding, and inverse polynomially small error) for an arbitrary family of size exp(n c ) for any fixed c > ... See full document
36
Non-Malleable Codes Against Bounded Polynomial Time Tampering
... computable functions ψ for which non-deterministic advice does not help speed up the ...with non-deterministic advice (as the advice can contain a ... See full document
30
Related subjects