2015
DOI: 10.1007/978-3-662-46494-6_17
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Non-malleable Codes

Abstract: A recent trend in cryptography is to construct cryptosystems that are secure against physical attacks. Such attacks are usually divided into two classes: the leakage attacks in which the adversary obtains some information about the internal state of the machine, and the tampering attacks where the adversary can modify this state. One of the popular tools used to provide tamper-resistance are the non-malleable codes introduced by Dziembowski, Pietrzak and Wichs (ICS 2010). These codes can be defined in several … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 32 publications
0
26
0
Order By: Relevance
“…Beyond the constructions of [23,9,25], non-malleable codes exists against block-wise tampering [11], against bit-wise tampering and permutations [5,4], against split-state tampering-both information-theoretic [22,2,7,3,1] and computational [38,18]-and in a setting where the computational complexity of the tampering functions is limited [8,27,34]. We stress that the typical application of non-malleable codes is to protect cryptographic schemes against memory tampering (see, e.g., [29,23,19,20]).…”
Section: More Details On Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Beyond the constructions of [23,9,25], non-malleable codes exists against block-wise tampering [11], against bit-wise tampering and permutations [5,4], against split-state tampering-both information-theoretic [22,2,7,3,1] and computational [38,18]-and in a setting where the computational complexity of the tampering functions is limited [8,27,34]. We stress that the typical application of non-malleable codes is to protect cryptographic schemes against memory tampering (see, e.g., [29,23,19,20]).…”
Section: More Details On Related Workmentioning
confidence: 99%
“…3 Reductions. When relating two distinguishing problems, it is convenient to use a special type of system C that translates one setting into the other.…”
Section: Distinguishersmentioning
confidence: 99%
See 1 more Smart Citation
“…The small mutual information of [6]. The number of leakage queries is proportional to the number of look-ahead threads, and thus to the number of errors done by the reduction when giving optimistic answers.…”
Section: Positive Resultsmentioning
confidence: 99%
“…We refer the reader to §1.5 for an overview of known constructions of non-malleable codes for different classes Φ. Previous work showed how to construct split-state non-malleable codes, both for the information-theoretic setting [27,25,4,18,6,3,13,7,37] and the computational setting [38,30,22,2].…”
Section: Introductionmentioning
confidence: 99%