### A constant-rate non-malleable code in the split-state model.

Divesh Aggarwal and Maciej Obremski

##### Abstract

Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs in ICS 2010, have emerged in the last few years as a fundamental object at the intersection of cryptography and coding theory. Non-malleable codes provide a useful message integrity guarantee in situations where traditional error-correction (and even error-detection) is impossible; for example, when the attacker can completely overwrite the encoded message. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely "unrelated value''. The family which received the most attention is the family of tampering functions in the so called (2-part) split-state model: here the message x is encoded into two shares L and R, and the attacker is allowed to arbitrarily tamper with each L and R individually. In this work, we give a constant rate non-malleable code from the tampering family containing so called 2-lookahead functions and forgetful functions, and combined with the work of Dodis, Kazana and the authors from STOC 2015, this gives the first constant rate non-malleable code in the split-state model with negligible error.

Available format(s)
Category
Foundations
Publication info
Published elsewhere. Major revision.FOCS 2020
Contact author(s)
dcsdiva @ nus edu sg
obremski math @ gmail com
History
2020-09-08: revised
See all versions
Short URL
https://ia.cr/2019/1299

CC BY

BibTeX

@misc{cryptoeprint:2019/1299,
author = {Divesh Aggarwal and Maciej Obremski},
title = {A constant-rate non-malleable code in the split-state model.},
howpublished = {Cryptology ePrint Archive, Paper 2019/1299},
year = {2019},
note = {\url{https://eprint.iacr.org/2019/1299}},
url = {https://eprint.iacr.org/2019/1299}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.