• No results found

[PDF] Top 20 Non-Malleable Codes for Partial Functions with Manipulation Detection

Has 10000 "Non-Malleable Codes for Partial Functions with Manipulation Detection" found on our website. Below are the top 20 most common "Non-Malleable Codes for Partial Functions with Manipulation Detection".

Non-Malleable  Codes  for  Partial  Functions  with  Manipulation  Detection

Non-Malleable Codes for Partial Functions with Manipulation Detection

... Security against memory tampering - (Logarithmic length alphabets, no CRS). In modern architectures data is stored and transmitted in chunks, thus our block-wise encoding scheme can provide tamper-resilience in all these ... See full document

30

Efficient  Non-Malleable  Codes   and  Key-Derivation  for  Poly-Size  Tampering  Circuits

Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits

... efficient codes, such that, with overwhelming probability, a random member of the family is non-malleable ...hash functions H. This result already shows the existence of efficient ... See full document

26

Continuously  Non-Malleable  Codes  in  the  Split-State  Model  from  Minimal  Assumptions

Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions

... Non-malleable codes. Only a few constructions of continuously non-malleable codes are known (besides the already mentioned constructions of ...continuous non-malleability ... See full document

30

Non-Malleable  Codes,  Extractors   and  Secret  Sharing  for  Interleaved  Tampering   and  Composition  of  Tampering

Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering

... any non-malleable code in the 2-split-state model gives a 2 out of 2 secret sharing scheme, if one views the two split states as two shares ...any non-malleable code in the interleaved 2-split ... See full document

37

Explicit  Non-malleable  Codes  Resistant  to  Permutations   and  Perturbations

Explicit Non-malleable Codes Resistant to Permutations and Perturbations

... (even malleable) implies a one-way function, which in turn imply string commitments in a black box way ...“tag-based” non-malleability [PR05b]. It should work with standard non-tag-based ... See full document

53

Statistical  Concurrent  Non-malleable  Zero-knowledge  from  One-way  Functions

Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions

... a partial transcript ρ of H b 0 (n, z) up until the end of Stage 1 of the left session such that under the condition that a prefix of the transcript is ρ , both of the above (i) and (ii) ... See full document

38

Non-malleable  Randomness  Encoders   and  their  Applications

Non-malleable Randomness Encoders and their Applications

... introduce Non-malleable Randomness ...ing non-malleable encoding C. The non-malleability is, as for standard NMCs, defined with respect to F , a family of tampering ...any non- ... See full document

30

Leakage-resilient  Algebraic  Manipulation  Detection  Codes  with  Optimal  Parameters

Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters

... (ρ-LLR-AMD) codes where the adversary has some partial information about the codeword c before choosing A, and the scheme is secure even conditioned on this partial ... See full document

14

Inception  Makes  Non-malleable  Codes  Stronger

Inception Makes Non-malleable Codes Stronger

... super non-malleability of (Enc, Dec) to conclude super-strong non-malleability of the modified encoding scheme, we need to do rejection sampling to ensure that the codeword is valid with re- spect to the ... See full document

26

Privacy  Amplification  from  Non-malleable  Codes

Privacy Amplification from Non-malleable Codes

... is Non-malleable codes, which were introduced in the work of Dziembowski, Pietrzak and Wichs ...two functions f and g, each acting independently on L and R ...any non-malleable ... See full document

37

Non-malleable  Reductions   and  Applications

Non-malleable Reductions and Applications

... Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a useful message integrity guarantee in situations where traditional error-correction (and even ... See full document

34

Non-Malleable  Codes  for  Small-Depth  Circuits

Non-Malleable Codes for Small-Depth Circuits

... A non-malleable reduction (E, D) reducing DNF-tampering to (leaky) local-tampering needs to satisfy two conditions (i) Pr[D(E(x)) = x] = 1 for any x and, (ii) D ◦ f ◦ E is a distribution over (leaky) local ... See full document

26

Non-Malleable  Codes  from  Average-Case  Hardness:  AC0,  Decision  Trees,   and  Streaming  Space-Bounded  Tampering

Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering

... tampering functions f ∈ AC 0 in general, since AC 0 contains all poly- size and constant depth circuit families, but rather provides tamper resilience against specific families in AC 0 (ACC 0 , ... See full document

48

Explicit  Non-Malleable  Codes  Resistant  to  Permutations

Explicit Non-Malleable Codes Resistant to Permutations

... that non-malleable codes can be useful in obtaining tamper-proof security as ...as functions from the allowed class of tampering-function f ∈ F ...a non-malleable code secure ... See full document

48

A  Rate-Optimizing  Compiler  for  Non-malleable  Codes  Against  Bit-wise  Tampering   and  Permutations

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations

... tampering functions being “compartmentalized” — ...explicit non- malleable code against a class of non-compartmentalized tampering ...of functions which can permute the bits of a ... See full document

23

Non-malleable  Codes  against  Lookahead  Tampering

Non-malleable Codes against Lookahead Tampering

... of non-malleable codes that provide a useful message integrity for such ...a non-malleable code ensures that the tampered codeword encodes the original message or a message that is ... See full document

33

A  constant-rate  non-malleable  code  in  the  split-state  model.

A constant-rate non-malleable code in the split-state model.

... a non-malleable code against the tampering family G containing 2-lookahead tampering functions and forgetful tampering ...a non-malleable reduction from the 2-split tampering family to ... See full document

28

Locally  Decodable   and  Updatable  Non-Malleable  Codes   and  Their  Applications

Locally Decodable and Updatable Non-Malleable Codes and Their Applications

... using non-malleable codes – instead of storing the secret (in the clear) on a device, one instead stores an encoding of the ...the non-malleable code guarantees that the adversary ... See full document

32

Capacity  of  Non-Malleable  Codes

Capacity of Non-Malleable Codes

... of non-malleable codes of rate close to 1 (with polynomial time encoding and decoding, and inverse polynomially small error) for an arbitrary family of size exp(n c ) for any fixed c > ... See full document

36

Non-Malleable  Codes  Against  Bounded  Polynomial  Time  Tampering

Non-Malleable Codes Against Bounded Polynomial Time Tampering

... computable functions ψ for which non-deterministic advice does not help speed up the ...with non-deterministic advice (as the advice can contain a ... See full document

30

Show all 10000 documents...