2017
DOI: 10.1007/978-3-319-63715-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Non-Malleable Codes for Space-Bounded Tampering

Abstract: Non-malleable codes-introduced by Dziembowski, Pietrzak and Wichs at ICS 2010are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering attacks against the memory. Clearly, non-malleability is hopeless if the class of tampering adversaries includes the deco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…Several constructions of non-malleable codes in the split-state model appeared in the literature, both for the information-theoretic [32,31,3,20,4,2,14,5,48,49,17] and computational setting [50,36,24,1,46,52,23]. Non-malleable codes exist also for several other models besides split-state tampering, including bit-wise independent tampering and permutations [20,6,7,22,21], circuits of polynomial size [32,19,38,39], constant-state tampering [18], block-wise tampering [13], space-bounded algorithms [35,9], bounded-depth circuits [8,16], and partial functions [47].…”
Section: Further Related Workmentioning
confidence: 99%
“…Several constructions of non-malleable codes in the split-state model appeared in the literature, both for the information-theoretic [32,31,3,20,4,2,14,5,48,49,17] and computational setting [50,36,24,1,46,52,23]. Non-malleable codes exist also for several other models besides split-state tampering, including bit-wise independent tampering and permutations [20,6,7,22,21], circuits of polynomial size [32,19,38,39], constant-state tampering [18], block-wise tampering [13], space-bounded algorithms [35,9], bounded-depth circuits [8,16], and partial functions [47].…”
Section: Further Related Workmentioning
confidence: 99%
“…Faust et al [FHMV17] gave constructions of (a weaker notion of) non-malleable codes against space-bounded tampering in the random oracle model.…”
Section: Related Workmentioning
confidence: 99%
“…A number of constructions also aim for additional properties, such as having efficient refreshing mechanisms that allow to update an existing codeword to a new one (decoding to the same message) without the need for decoding [FN17]. Some constructions also specifically focus on computationally restricted adversaries, either in terms of time or space complexity (e.g., [FHMV17,BDSKM17]).…”
Section: Related Workmentioning
confidence: 99%