[Resource Topic] 2017/040: Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions

Welcome to the resource topic for 2017/040

Title:
Practical Non-Malleable Codes from \ell-more Extractable Hash Functions

Authors: Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis

Abstract:

In this work, we significantly improve the efficiency of non-malleable codes in the split state model, by constructing a code with codeword length |s|+O(k), where |s| is the length of the message, and k is the security parameter. This is a substantial improvement over previous constructions, both asymptotically and concretely. Our construction relies on a new primitive which we define and study, called \ell-more extractable hash functions. This notion, which may be of independent interest, guarantees that any adversary that is given access to \ell \in \mathbb{N} precomputed hash values v_{1},\dots, v_{\ell}, and produces a new valid hash value \tilde v, then it must know a pre-image of \tilde v. This is a stronger notion that the one by Bitansky et al. (Eprint '11) and Goldwasser et al. (ITCS '12, Eprint '14), which considers adversaries that get no access to precomputed hash values prior to producing their own value. By appropriately relaxing the extractability requirement (without hurting the applicability of the primitive) we instantiate \ell-more extractable hash functions under the same assumptions used for the previous extractable hash functions by Bitansky et al. and Goldwasser et al. (a variant of the Knowledge of Exponent Assumption).

ePrint: https://eprint.iacr.org/2017/040

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .