(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
-
Published:2024-04
Issue:2
Volume:37
Page:
-
ISSN:0933-2790
-
Container-title:Journal of Cryptology
-
language:en
-
Short-container-title:J Cryptol
Author:
Kiayias Aggelos,Liu Feng-Hao,Tselekounis Yiannis
Abstract
AbstractNon-malleable codes were introduced by Dziembowski et al. (in: Yao (ed) ICS2010, Tsinghua University Press, 2010), and its main application is the protection of cryptographic devices against tampering attacks on memory. In this work, we initiate a comprehensive study on non-malleable codes for the class of partial functions, that read/write on an arbitrary subset of codeword bits with specific cardinality. We present two constructions: the first one is in the CRS model and allows the adversary to selectively choose the subset of codeword bits, while the latter is in the standard model and adaptively secure. Our constructions are efficient in terms of information rate, while allowing the attacker to access asymptotically almost the entire codeword. In addition, they satisfy a notion which is stronger than non-malleability, that we call non-malleability with manipulation detection, guaranteeing that any modified codeword decodes to either the original message or to $$\bot $$
⊥
. We show that our primitive implies All-Or-Nothing Transforms (AONTs), and as a result our constructions yield efficient AONTs under standard assumptions (only one-way functions), which, to the best of our knowledge, was an open question until now. Furthermore, we construct a notion of continuous non-malleable codes (CNMC), namely CNMC with light updates, that avoids the full re-encoding process and only uses shuffling and refreshing operations. Finally, we present a number of additional applications of our primitive in tamper resilience.
Publisher
Springer Science and Business Media LLC
Reference64 articles.
1. D. Aggarwal, S. Agrawal, D. Gupta, H.K. Maji, O. Pandey, M. Prabhakaran, Optimal computational split-state non-malleable codes, in E. Kushilevitz, T. Malkin, editors, TCC 2016-A: 13th Theory of Cryptography Conference, Part II. Lecture Notes in Computer Science, vol. 9563 (Springer, Heidelberg, 2016), pp. 393–417, Tel Aviv, Israel, Jan. 10–13, 2016 2. D. Aggarwal, Y. Dodis, T. Kazana, M. Obremski, Non-malleable reductions and applications, in R.A. Servedio, R. Rubinfeld, editors, 47th Annual ACM Symposium on Theory of Computing (ACM Press, Portland, 2015), pp. 459–468 3. D. Aggarwal, Y. Dodis, S. Lovett. Non-malleable codes from additive combinatorics, in D.B. Shmoys, editor, 46th Annual ACM Symposium on Theory of Computing (ACM Press, New York, 2014), pp. 774–783 4. S. Agrawal, D. Gupta, H.K. Maji, O. Pandey, M. Prabhakaran, Explicit non-malleable codes against bit-wise tampering and permutations, in R. Gennaro, M.J.B. Robshaw, editors, Advances in Cryptology—CRYPTO 2015, Part I. Lecture Notes in Computer Science, vol. 9215, Santa Barbara, CA, USA, Aug. 16–20, 2015 (Springer, Heidelberg, 2015), pp. 538–557 5. S. Agrawal, D. Gupta, H.K. Maji, O. Pandey, M. Prabhakaran, A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations, in Y. Dodis, J.B. Nielsen, editors, TCC 2015: 12th Theory of Cryptography Conference, Part I. Lecture Notes in Computer Science, vol. 9014, Warsaw, Poland, Mar. 23–25, 2015 (Springer, Heidelberg, 2015), pp. 375–397
|
|