Paper 2018/542

Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions

Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, and Ivan Visconti

Abstract

At ICS 2010, Dziembowski, Pietrzak and Wichs introduced the notion of *non-malleable codes*, a weaker form of error-correcting codes guaranteeing that the decoding of a tampered codeword either corresponds to the original message or to an unrelated value. The last few years established non-malleable codes as one of the recently invented cryptographic primitives with the highest impact and potential, with very challenging open problems and applications. In this work, we focus on so-called *continuously* non-malleable codes in the split-state model, as proposed by Faust et al. (TCC 2014), where a codeword is made of two shares and an adaptive adversary makes a polynomial number of attempts in order to tamper the target codeword, where each attempt is allowed to modify the two shares independently (yet arbitrarily). Achieving continuous non-malleability in the split-state model has been so far very hard. Indeed, the only known constructions require strong setup assumptions (i.e., the existence of a common reference string) and strong complexity-theoretic assumptions (i.e., the existence of non-interactive zero-knowledge proofs and collision-resistant hash functions). As our main result, we construct a continuously non-malleable code in the split-state model without setup assumptions, requiring only one-to-one one-way functions (i.e., essentially optimal computational assumptions). Our result introduces several new ideas that make progress towards understanding continuous non-malleability, and shows interesting connections with protocol-design and proof-approach techniques used in other contexts (e.g., look-ahead simulation in zero-knowledge proofs, non-malleable commitments, and leakage resilience).

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in CRYPTO 2018
Keywords
continuously non-malleable codessplit-state tamperingplain modelminimal assumptions
Contact author(s)
rafail @ cs ucla edu
giuper @ gmail com
venturi @ di uniroma1 it
ivan visconti @ gmail com
History
2018-06-04: received
Short URL
https://ia.cr/2018/542
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/542,
      author = {Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti},
      title = {Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions},
      howpublished = {Cryptology ePrint Archive, Paper 2018/542},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/542}},
      url = {https://eprint.iacr.org/2018/542}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.