Non-malleable codes for space-bounded tampering

Author: A Faonio, A Faonio, A Faonio, A Fiat, C Dwork, C Hazay, D Boneh, D Boneh, D Dachman-Soled, F-H Liu, G Ateniese, I Damgård, J Katz, JB Nielsen, L Ren, M Ball, M Fischlin, M Naor, R Bhattacharyya, R Gennaro, S Coretti, S Coretti, S Dziembowski, S Dziembowski, S Dziembowski, S Faust, S Faust, S Faust, S Faust, Y Dodis, Z Jafargholi
Publisher: Springer Science and Business Media LLC

ABOUT BOOK

Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering attacks against the memory. Clearly, non-malleability is hopeless if the class of tampering adversaries includes the decoding and encoding algorithm. To circumvent this obstacle, the majority of past research focused on designing non-malleable codes for various tampering classes, albeit assuming that the adversary is unable to decode. Nonetheless, in many concrete settings, this assumption is not realistic

Powered by: