Paper 2017/1061
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, and Tal Malkin
Abstract
We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class F, it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof systems) satisfying certain properties with respect to the class.
We instantiate our scheme in a variety of contexts, yielding efficient, non-malleable codes (NMC) against the following tampering classes:
1. Computational NMC against AC0 tampering, in the CRS model,
assuming a PKE scheme with decryption in AC0 and NIZK.
2. Computational NMC against bounded-depth decision trees (of depth
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Preprint. MINOR revision.
- Keywords
- non-malleablecodesstreamingbounded spacesmall circuitsdecision trees
- Contact author(s)
- mukul @ terpmail umd edu
- History
- 2018-02-22: last of 2 revisions
- 2017-11-03: received
- See all versions
- Short URL
- https://ia.cr/2017/1061
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/1061, author = {Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes from Average-Case Hardness: {AC0}, Decision Trees, and Streaming Space-Bounded Tampering}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/1061}, year = {2017}, url = {https://eprint.iacr.org/2017/1061} }