TY - GEN
T1 - Non-malleable codes from average-case hardness:, decision trees, and streaming space-bounded tampering
AU - Ball, Marshall
AU - Dachman-Soled, Dana
AU - Kulkarni, Mukul
AU - Malkin, Tal
N1 - Publisher Copyright:
© 2018, International Association for Cryptologic Research.
PY - 2018
Y1 - 2018
N2 - We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class$${\mathcal {F}}$$, it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof systems) satisfying certain properties with respect to the class. We instantiate our scheme in a variety of contexts, yielding efficient, non-malleable codes (NMC) against the following tampering classes: Computational NMC against$${\mathsf {A}}{\mathsf {C}}^0$$ tampering, in the CRS model, assuming a PKE scheme with decryption in$${\mathsf {A}}{\mathsf {C}}^0$$ and NIZK.Computational NMC against bounded-depth decision trees (of depth$$n^\epsilon $$, where n is the number of input variables and constant$$0<\epsilon<1$$ ), in the CRS model and under the same computational assumptions as above.Information theoretic NMC (with no CRS) against a streaming, space-bounded adversary, namely an adversary modeled as a read-once branching program with bounded width. Ours are the first constructions that achieve each of the above in an efficient way, under the standard notion of non-malleability.
AB - We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class$${\mathcal {F}}$$, it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof systems) satisfying certain properties with respect to the class. We instantiate our scheme in a variety of contexts, yielding efficient, non-malleable codes (NMC) against the following tampering classes: Computational NMC against$${\mathsf {A}}{\mathsf {C}}^0$$ tampering, in the CRS model, assuming a PKE scheme with decryption in$${\mathsf {A}}{\mathsf {C}}^0$$ and NIZK.Computational NMC against bounded-depth decision trees (of depth$$n^\epsilon $$, where n is the number of input variables and constant$$0<\epsilon<1$$ ), in the CRS model and under the same computational assumptions as above.Information theoretic NMC (with no CRS) against a streaming, space-bounded adversary, namely an adversary modeled as a read-once branching program with bounded width. Ours are the first constructions that achieve each of the above in an efficient way, under the standard notion of non-malleability.
UR - http://www.scopus.com/inward/record.url?scp=85045874891&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85045874891&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-78372-7_20
DO - 10.1007/978-3-319-78372-7_20
M3 - Conference contribution
AN - SCOPUS:85045874891
SN - 9783319783710
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 618
EP - 650
BT - Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings
A2 - Nielsen, Jesper Buus
A2 - Rijmen, Vincent
PB - Springer Verlag
T2 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018
Y2 - 29 April 2018 through 3 May 2018
ER -