2015
DOI: 10.1007/978-3-662-46494-6_22
|View full text |Cite
|
Sign up to set email alerts
|

From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes

Abstract: One approach towards basing public-key encryption (PKE) schemes on weak and credible assumptions is to build "stronger" or more general schemes generically from "weaker" or more restricted ones. One particular line of work in this context was initiated by Myers and shelat (FOCS '09) and continued by Hohenberger, Lewko, and Waters (Eurocrypt '12), who provide constructions of multi-bit CCA-secure PKE from single-bit CCA-secure PKE.It is well-known that encrypting each bit of a plaintext string independently is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 53 publications
(56 citation statements)
references
References 48 publications
0
56
0
Order By: Relevance
“…Most of the earlier works on non-malleable codes focus on granular tampering models, where the tampering functions are restricted to act on individual components of the codeword independently. The original work of [20] (see also [12]) gives an efficient construction for bit-tampering (i.e., the adversary can tamper with each bit of the codeword independently of every other bit). Very recently, Cheraghchi and Guruswami [10] gave a construction with improved rate and better efficiency for the same family.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the earlier works on non-malleable codes focus on granular tampering models, where the tampering functions are restricted to act on individual components of the codeword independently. The original work of [20] (see also [12]) gives an efficient construction for bit-tampering (i.e., the adversary can tamper with each bit of the codeword independently of every other bit). Very recently, Cheraghchi and Guruswami [10] gave a construction with improved rate and better efficiency for the same family.…”
Section: Related Workmentioning
confidence: 99%
“…The bending set B ⊆ X is the set of all high queries f such that w f exists and d H (w f ,c) > αn. 10 It is readily verified that H 2 is a parallel stateless self-destruct game (cf. Definition 6) that behaves according to g, and that H 1 is its B-bending.…”
Section: Hybridsmentioning
confidence: 98%
“…This variant, introduced in [10], allows arbitrarily many queries to the decryption oracle, but each of them may consist of a single ciphertext only, i.e., q arbitrary (denoted by q = * ) and p = 1. Once more, set G Π,ind-sda…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, they also found application to computational cryptography Full version of this paper available at http://eprint.iacr.org/2016/397 (e.g. construction of non-malleable commitments [AGM + 15b], domain extension for public-key encryption schemes [CMTV15,CDTV16]). Roughly speaking, a coding scheme (Enc, Dec) is non-malleable with respect to the tampering function f if decoding f (Enc(m)) produces the original message m or a value m (eventually ⊥) completely unrelated with m. Moreover, the probability of which one of these two events happens is also independent of m. As an illustration of the notion, consider a key that is stored in a device.…”
Section: Introductionmentioning
confidence: 99%