Paper 2016/1192

Non-Malleable Codes with Split-State Refresh

Antonio Faonio and Jesper Buus Nielsen


Non-Malleable Codes for the split state model allow to encode a mes- sage into two parts such that arbitrary independent tampering on the parts either destroys completely the content or maintains the message untouched. If the code is also leakage resilient it allows limited independent leakage from the two parts. We propose a model where the two parts can be refreshed independently. We give an abstract framework for building codes for this model, instantiate the construc- tion under the external Diffie-Hellman assumption and give applications of such split-state refreshing. An advantage of our new model is that it allows arbitrarily many tamper attacks and arbitrarily large leakage over the life-time of the systems as long as occasionally each part of the code is refreshed. Our model also tolerates that the refreshing occasionally is leaky or tampered with.

Available format(s)
Publication info
A major revision of an IACR publication in PKC 2017
non-malleable codesleakage resiliencetamper resilience
Contact author(s)
afaonio @ gmail com
jbn @ cs au dk
2017-01-01: received
Short URL
Creative Commons Attribution


      author = {Antonio Faonio and Jesper Buus Nielsen},
      title = {Non-Malleable Codes with Split-State Refresh},
      howpublished = {Cryptology ePrint Archive, Paper 2016/1192},
      year = {2016},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.