Paper 2016/1192

Non-Malleable Codes with Split-State Refresh

Antonio Faonio and Jesper Buus Nielsen

Abstract

Non-Malleable Codes for the split state model allow to encode a mes- sage into two parts such that arbitrary independent tampering on the parts either destroys completely the content or maintains the message untouched. If the code is also leakage resilient it allows limited independent leakage from the two parts. We propose a model where the two parts can be refreshed independently. We give an abstract framework for building codes for this model, instantiate the construc- tion under the external Diffie-Hellman assumption and give applications of such split-state refreshing. An advantage of our new model is that it allows arbitrarily many tamper attacks and arbitrarily large leakage over the life-time of the systems as long as occasionally each part of the code is refreshed. Our model also tolerates that the refreshing occasionally is leaky or tampered with.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
A major revision of an IACR publication in PKC 2017
Keywords
non-malleable codesleakage resiliencetamper resilience
Contact author(s)
afaonio @ gmail com
jbn @ cs au dk
History
2017-01-01: received
Short URL
https://ia.cr/2016/1192
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/1192,
      author = {Antonio Faonio and Jesper Buus Nielsen},
      title = {Non-Malleable Codes with Split-State Refresh},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/1192},
      year = {2016},
      url = {https://eprint.iacr.org/2016/1192}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.