首页> 外文期刊>Electronic Colloquium on Computational Complexity >Non-Malleable Codes Against Constant Split-State Tampering
【24h】

Non-Malleable Codes Against Constant Split-State Tampering

机译:防止恒定分裂状态篡改的非恶意代码

获取原文
           

摘要

Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs cite{DPW10} as an elegant generalization of the classical notions of error detection, where the corruption of a codeword is viewed as a tampering function acting on it. Informally, a non-malleable code with respect to a family of tampering functions consists of a randomized encoding function Enc and a deterministic decoding function Dec such that for any m , Dec ( Enc ( m )) = m . Further, for any tampering function f and any message m , Dec ( f ( Enc ( m ))) is either m or is -close to a distribution D f independent of m , where is called the error.Of particular importance are non-malleable codes in the C -split-state model. In this model, the codeword is partitioned into C equal sized blocks and the tampering function family consists of functions ( f 1 f C ) such that f i acts on the i th block. For C = 1 there cannot exist non-malleable codes. For C = 2 , the best known explicit construction is by Aggarwal, Dodis and Lovett cite{ADL13} who achieve rate = ( n ? 6 7 ) and error = 2 ? ( n ? 1 7 ) , where n is the block length of the code.In our main result, we construct efficient non-malleable codes in the C -split-state model for C = 1 0 that achieve constant rate and error = 2 ? ( n ) . These are the first explicit codes of constant rate in the C -split-state model for any C = o ( n ) , that do not rely on any unproven assumptions. We also improve the error in the explicit non-malleable codes constructed in the bit tampering model by Cheraghchi and Guruswami cite{CG14b}. Our constructions use an elegant connection found between seedless non-malleable extractors and non-malleable codes by Cheraghchi and Guruswami cite{CG14b}. We explicitly construct such seedless non-malleable extractors for 10 independent sources and deduce our results on non-malleable codes based on this connection. Our constructions of extractors use encodings and a new variant of the sum-product theorem.
机译:Dziembowski,Pietrzak和Wichs cite {DPW10}引入了不可篡改的代码,将其作为经典的错误检测概念的优雅概括,其中代码字的损坏被视为对其执行的篡改功能。非正式地,关于篡改函数系列的不可篡改代码由随机编码函数 Enc和确定性解码函数 Dec组成,使得对于任何m, Dec( Enc(m))= m。此外,对于任何篡改函数f和任何消息m而言, Dec(f( Enc(m)))为m或-接近独立于m的分布D f的位置,这被称为错误。 C分裂状态模型中的非恶意代码。在此模型中,码字被划分为C个相等大小的块,篡改函数族由函数(f 1 f C)组成,以使f i作用于第i个块。对于C = 1,将不存在不可恶意编码。对于C = 2,最著名的显式构造是由Aggarwal,Dodis和Lovett cite {ADL13}构成的,它们的比率为(n?6 7)且误差= 2? (n?1 7),其中n是代码的块长。在我们的主要结果中,我们在C分裂状态模型中构造了C = 1 0且效率恒定且错误= 2的有效不可恶意代码。 ? (n)。这些是任何C = o(n)的C分裂状态模型中恒定速率的第一个显式代码,它不依赖于任何未经验证的假设。我们还改善了Cheraghchi和Guruswami cite {CG14b}在位篡改模型中构造的显式不可恶意代码中的错误。我们的构造使用了无格式的不可恶意提取程序和Cheraghchi和Guruswami cite {CG14b}在不可恶意代码之间的优雅联系。我们为10个独立来源显式构造了这种无种子的非恶意提取器,并基于这种联系在非恶意代码上推论出了我们的结果。我们的提取器构造使用编码和和积定理的新变体。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号