Non-malleable Codes from Additive Combinatorics

被引:76
作者
Aggarwal, Divesh [1 ]
Dodis, Yevgeniy [1 ]
Lovett, Shachar [2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] Univ Calif San Diego, San Diego, CA 92103 USA
来源
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING | 2014年
基金
美国国家科学基金会;
关键词
EXTRACTORS; RESILIENT; THEOREM; PROOF;
D O I
10.1145/2591796.2591804
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-malleable codes provide a useful and meaningful security guarantee in situations where traditional error correction (and even error-detection) is impossible; for example, when the attacker can completely overwrite the encoded message. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely unrelated value. Although such codes do not exist if the family of "tampering functions".F is completely unrestricted, they are known to exist for many broad tampering families T. One such natural family is the family of tampering functions in the so called split-state model. Here the message m is encoded into two shares L and R, and the attacker is allowed to arbitrarily tamper with L and R individually. The split-state tampering arises in many realistic applications, such as the design of non-malleable secret sharing schemes, motivating the question of designing efficient non-malleable codes in this model. Prior to this work, non-malleable codes in the split state model received considerable attention in the literature, but were constructed either (1) in the random oracle model [16], or (2) relied on advanced cryptographic assumptions (such as non-interactive zero-knowledge proofs and leakage-resilient encryption) [26], or (3) could only encode 1-bit messages [14]. As our main result, we build the first efficient, multi-bit, information-theoretically-secure non-malleable code in the split-state model. The heart of our construction uses the following new property of the inner-product function (L, R) over the vector space F-p(n) (for a prime p and large enough dimension it): if L and R are uniformly random over F-p(n), and f, g : F-p(n) -> F-p(n) are two arbitrary functions on L and R, then the joint distribution (< L, R >, (f (L), g(R))) is "close" to the convex combination of "affine distributions" {(U,aU + b) a,b E Fp}, where U is uniformly random in F-p. In turn, the proof of this surprising property of the inner product function critically relies on some results from additive combinatorics, including the so called Quasi-polynomial Freiman-Ruzsa Theorem which was recently established by Sanders [29] as a step towards resolving the Polynomial Freiman-Ruzsa conjecture [21].
引用
收藏
页码:774 / 783
页数:10
相关论文
共 30 条
[1]  
[Anonymous], 2010, J ACM
[2]   A STATISTICAL THEOREM OF SET ADDITION [J].
BALOG, A ;
SZEMEREDI, E .
COMBINATORICA, 1994, 14 (03) :263-268
[3]  
Boyen X, 2005, LECT NOTES COMPUT SC, V3494, P147
[4]  
Chabanne H., 2012, Proceedings of the 2012 IEEE International Symposium on Information Theory - ISIT, P2546, DOI 10.1109/ISIT.2012.6283976
[5]  
Chabanne H., 2011, IEEE Information Theory Workshop (ITW 2011), P55, DOI 10.1109/ITW.2011.6089565
[6]  
Cheraghchi M., 2014, THEOR CRYPT C TCC
[7]  
Cheraghchi Mahdi, 2014, INNOVATIONS THEORETI, P155, DOI [10.1145/2554797.2554814, DOI 10.1145/2554797.2554814]
[8]  
Choi SG, 2011, LECT NOTES COMPUT SC, V7073, P740, DOI 10.1007/978-3-642-25385-0_40
[9]  
Cramer R., 2008, EUROCRYPT 2008
[10]  
Davì F, 2010, LECT NOTES COMPUT SC, V6280, P121, DOI 10.1007/978-3-642-15317-4_9