Locally Decodable and Updatable Non-malleable Codes and Their Applications View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015

AUTHORS

Dana Dachman-Soled , Feng-Hao Liu , Elaine Shi , Hong-Sheng Zhou

ABSTRACT

Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak and Wichs (ICS ’10), provide the security guarantee that the message contained in a tampered codeword is either the same as the original message or is set to an unrelated value. Various applications of non-malleable codes have been discovered, and one of the most significant applications among these is the connection with tamper-resilient cryptography. There is a large body of work considering security against various classes of tampering functions, as well as non-malleable codes with enhanced features such as leakage resilience.In this work, we propose combining the concepts of non-malleability, leakage resilience, and locality in a coding scheme. The contribution of this work is three-fold:As a conceptual contribution, we define a new notion of locally decodable and updatable non-malleable code that combines the above properties.We present two simple and efficient constructions achieving our new notion with different levels of security.We present an important application of our new tool – securing RAM computation against memory tampering and leakage attacks. This is analogous to the usage of traditional non-malleable codes to secure implementations in the circuit model against memory tampering and leakage attacks. More... »

PAGES

427-450

Book

TITLE

Theory of Cryptography

ISBN

978-3-662-46493-9
978-3-662-46494-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-46494-6_18

DOI

http://dx.doi.org/10.1007/978-3-662-46494-6_18

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1023467574


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Maryland, USA", 
          "id": "http://www.grid.ac/institutes/grid.410443.6", 
          "name": [
            "University of Maryland, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dachman-Soled", 
        "givenName": "Dana", 
        "id": "sg:person.011244513001.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011244513001.85"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Maryland, USA", 
          "id": "http://www.grid.ac/institutes/grid.410443.6", 
          "name": [
            "University of Maryland, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Feng-Hao", 
        "id": "sg:person.012403661357.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012403661357.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Maryland, USA", 
          "id": "http://www.grid.ac/institutes/grid.410443.6", 
          "name": [
            "University of Maryland, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shi", 
        "givenName": "Elaine", 
        "id": "sg:person.014706274717.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014706274717.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Virginia Commonwealth University, USA", 
          "id": "http://www.grid.ac/institutes/grid.224260.0", 
          "name": [
            "Virginia Commonwealth University, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhou", 
        "givenName": "Hong-Sheng", 
        "id": "sg:person.012426605052.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012426605052.45"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015", 
    "datePublishedReg": "2015-01-01", 
    "description": "Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak and Wichs (ICS \u201910), provide the security guarantee that the message contained in a tampered codeword is either the same as the original message or is set to an unrelated value. Various applications of non-malleable codes have been discovered, and one of the most significant applications among these is the connection with tamper-resilient cryptography. There is a large body of work considering security against various classes of tampering functions, as well as non-malleable codes with enhanced features such as leakage resilience.In this work, we propose combining the concepts of non-malleability, leakage resilience, and locality in a coding scheme. The contribution of this work is three-fold:As a conceptual contribution, we define a new notion of locally decodable and updatable non-malleable code that combines the above properties.We present two simple and efficient constructions achieving our new notion with different levels of security.We present an important application of our new tool \u2013 securing RAM computation against memory tampering and leakage attacks. This is analogous to the usage of traditional non-malleable codes to secure implementations in the circuit model against memory tampering and leakage attacks.", 
    "editor": [
      {
        "familyName": "Dodis", 
        "givenName": "Yevgeniy", 
        "type": "Person"
      }, 
      {
        "familyName": "Nielsen", 
        "givenName": "Jesper Buus", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-46494-6_18", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-46493-9", 
        "978-3-662-46494-6"
      ], 
      "name": "Theory of Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "non-malleable codes", 
      "updatable non-malleable code", 
      "memory tampering", 
      "leakage attacks", 
      "leakage resilience", 
      "tamper-resilient cryptography", 
      "error-correcting codes", 
      "RAM computations", 
      "security guarantees", 
      "new notion", 
      "original message", 
      "unrelated value", 
      "enhanced features", 
      "tampering", 
      "efficient construction", 
      "security", 
      "code", 
      "important applications", 
      "significant applications", 
      "messages", 
      "attacks", 
      "cryptography", 
      "applications", 
      "Pietrzak", 
      "guarantees", 
      "Dziembowski", 
      "codewords", 
      "decodable", 
      "computation", 
      "implementation", 
      "conceptual contribution", 
      "scheme", 
      "work", 
      "three-fold", 
      "different levels", 
      "usage", 
      "notion", 
      "resilience", 
      "features", 
      "concept", 
      "large body", 
      "construction", 
      "model", 
      "class", 
      "connection", 
      "above properties", 
      "localities", 
      "wich", 
      "contribution", 
      "circuit model", 
      "function", 
      "values", 
      "properties", 
      "levels", 
      "relaxation", 
      "body", 
      "new tool \u2013 securing RAM computation", 
      "tool \u2013 securing RAM computation", 
      "traditional non-malleable codes"
    ], 
    "name": "Locally Decodable and Updatable Non-malleable Codes and Their Applications", 
    "pagination": "427-450", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1023467574"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-46494-6_18"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-46494-6_18", 
      "https://app.dimensions.ai/details/publication/pub.1023467574"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-11-01T19:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/chapter/chapter_438.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-46494-6_18"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46494-6_18'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46494-6_18'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46494-6_18'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46494-6_18'


 

This table displays all metadata directly associated to this object as RDF triples.

148 TRIPLES      23 PREDICATES      85 URIs      78 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-46494-6_18 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N2599f71c82d44a4281057524db1018c6
4 schema:datePublished 2015
5 schema:datePublishedReg 2015-01-01
6 schema:description Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak and Wichs (ICS ’10), provide the security guarantee that the message contained in a tampered codeword is either the same as the original message or is set to an unrelated value. Various applications of non-malleable codes have been discovered, and one of the most significant applications among these is the connection with tamper-resilient cryptography. There is a large body of work considering security against various classes of tampering functions, as well as non-malleable codes with enhanced features such as leakage resilience.In this work, we propose combining the concepts of non-malleability, leakage resilience, and locality in a coding scheme. The contribution of this work is three-fold:As a conceptual contribution, we define a new notion of locally decodable and updatable non-malleable code that combines the above properties.We present two simple and efficient constructions achieving our new notion with different levels of security.We present an important application of our new tool – securing RAM computation against memory tampering and leakage attacks. This is analogous to the usage of traditional non-malleable codes to secure implementations in the circuit model against memory tampering and leakage attacks.
7 schema:editor Nb35247cc276f4beea414a1306d80c676
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N0871b66010504e3cb07af24fddc20db3
12 schema:keywords Dziembowski
13 Pietrzak
14 RAM computations
15 above properties
16 applications
17 attacks
18 body
19 circuit model
20 class
21 code
22 codewords
23 computation
24 concept
25 conceptual contribution
26 connection
27 construction
28 contribution
29 cryptography
30 decodable
31 different levels
32 efficient construction
33 enhanced features
34 error-correcting codes
35 features
36 function
37 guarantees
38 implementation
39 important applications
40 large body
41 leakage attacks
42 leakage resilience
43 levels
44 localities
45 memory tampering
46 messages
47 model
48 new notion
49 new tool – securing RAM computation
50 non-malleable codes
51 notion
52 original message
53 properties
54 relaxation
55 resilience
56 scheme
57 security
58 security guarantees
59 significant applications
60 tamper-resilient cryptography
61 tampering
62 three-fold
63 tool – securing RAM computation
64 traditional non-malleable codes
65 unrelated value
66 updatable non-malleable code
67 usage
68 values
69 wich
70 work
71 schema:name Locally Decodable and Updatable Non-malleable Codes and Their Applications
72 schema:pagination 427-450
73 schema:productId N38d080d94f504cf7b45012a346f76637
74 N8341d75a17674ae5b166aeb1e82cf751
75 schema:publisher Neaa54daaaee7448597e28be263c37be8
76 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023467574
77 https://doi.org/10.1007/978-3-662-46494-6_18
78 schema:sdDatePublished 2021-11-01T19:01
79 schema:sdLicense https://scigraph.springernature.com/explorer/license/
80 schema:sdPublisher Nfb8d0314fe1443b88317f254ca3a83c6
81 schema:url https://doi.org/10.1007/978-3-662-46494-6_18
82 sgo:license sg:explorer/license/
83 sgo:sdDataset chapters
84 rdf:type schema:Chapter
85 N0871b66010504e3cb07af24fddc20db3 schema:isbn 978-3-662-46493-9
86 978-3-662-46494-6
87 schema:name Theory of Cryptography
88 rdf:type schema:Book
89 N132a4de1b68a46d08cb17793db7431eb schema:familyName Dodis
90 schema:givenName Yevgeniy
91 rdf:type schema:Person
92 N2599f71c82d44a4281057524db1018c6 rdf:first sg:person.011244513001.85
93 rdf:rest Ne90560f3dcda4cac863c84027e1a458c
94 N38d080d94f504cf7b45012a346f76637 schema:name dimensions_id
95 schema:value pub.1023467574
96 rdf:type schema:PropertyValue
97 N3e31fb748f444043a2902776727522f6 rdf:first sg:person.012426605052.45
98 rdf:rest rdf:nil
99 N8341d75a17674ae5b166aeb1e82cf751 schema:name doi
100 schema:value 10.1007/978-3-662-46494-6_18
101 rdf:type schema:PropertyValue
102 N83b9d84c7d524a49bf2d9965bd33755b rdf:first sg:person.014706274717.52
103 rdf:rest N3e31fb748f444043a2902776727522f6
104 N99609e16d4a24af5a053a28bd8341e98 schema:familyName Nielsen
105 schema:givenName Jesper Buus
106 rdf:type schema:Person
107 N9b2166af814b48e4afe25c41d505181c rdf:first N99609e16d4a24af5a053a28bd8341e98
108 rdf:rest rdf:nil
109 Nb35247cc276f4beea414a1306d80c676 rdf:first N132a4de1b68a46d08cb17793db7431eb
110 rdf:rest N9b2166af814b48e4afe25c41d505181c
111 Ne90560f3dcda4cac863c84027e1a458c rdf:first sg:person.012403661357.00
112 rdf:rest N83b9d84c7d524a49bf2d9965bd33755b
113 Neaa54daaaee7448597e28be263c37be8 schema:name Springer Nature
114 rdf:type schema:Organisation
115 Nfb8d0314fe1443b88317f254ca3a83c6 schema:name Springer Nature - SN SciGraph project
116 rdf:type schema:Organization
117 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
118 schema:name Information and Computing Sciences
119 rdf:type schema:DefinedTerm
120 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
121 schema:name Data Format
122 rdf:type schema:DefinedTerm
123 sg:person.011244513001.85 schema:affiliation grid-institutes:grid.410443.6
124 schema:familyName Dachman-Soled
125 schema:givenName Dana
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011244513001.85
127 rdf:type schema:Person
128 sg:person.012403661357.00 schema:affiliation grid-institutes:grid.410443.6
129 schema:familyName Liu
130 schema:givenName Feng-Hao
131 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012403661357.00
132 rdf:type schema:Person
133 sg:person.012426605052.45 schema:affiliation grid-institutes:grid.224260.0
134 schema:familyName Zhou
135 schema:givenName Hong-Sheng
136 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012426605052.45
137 rdf:type schema:Person
138 sg:person.014706274717.52 schema:affiliation grid-institutes:grid.410443.6
139 schema:familyName Shi
140 schema:givenName Elaine
141 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014706274717.52
142 rdf:type schema:Person
143 grid-institutes:grid.224260.0 schema:alternateName Virginia Commonwealth University, USA
144 schema:name Virginia Commonwealth University, USA
145 rdf:type schema:Organization
146 grid-institutes:grid.410443.6 schema:alternateName University of Maryland, USA
147 schema:name University of Maryland, USA
148 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...