Paper 2016/340
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay, Vipul Goyal, and Xin Li
Abstract
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are \emph{seeded non-malleable extractors}, introduced by Dodis and Wichs \cite{DW09}; \emph{seedless non-malleable extractors}, introduced by Cheraghchi and Guruswami \cite{CG14b}; and \emph{non-malleable codes}, introduced by Dziembowski, Pietrzak and Wichs \cite{DPW10}. Besides being interesting on their own, they also have important applications in cryptography, e.g, privacy amplification with an active adversary, explicit non-malleable codes etc, and often have unexpected connections to their non-tampered analogues \cite{Li12b} \cite{CZ15}. %For example, seeded non-malleable extractors are closely related to privacy amplification with an active adversary, non-malleable codes are related to non-malleable secret sharing, and seedless non-malleable extractors provide a universal way to construct explicit non-malleable codes.
However, the known constructions are far behind their non-tampered counterparts. Indeed, the best known seeded non-malleable extractor requires min-entropy rate at least
Note: Full version
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Major revision. STOC 2016
- Contact author(s)
- vipul goyal @ gmail com
- History
- 2016-03-30: received
- Short URL
- https://ia.cr/2016/340
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/340, author = {Eshan Chattopadhyay and Vipul Goyal and Xin Li}, title = {Non-Malleable Extractors and Codes, with their Many Tampered Extensions}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/340}, year = {2016}, url = {https://eprint.iacr.org/2016/340} }