[Resource Topic] 2022/1004: Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting

Welcome to the resource topic for 2022/1004

Title:
Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting

Authors: Nils Fleischhacker, Suparno Ghoshal, Mark Simkin

Abstract:

Interactive Non-Malleable Codes were introduced by Fleischhacker et al. (TCC 2019) in the two party setting with synchronous tampering.
The idea of this type of non-malleable code is that it “encodes” an interactive protocol in such a way that, even if the messages are tampered with according to some class \mathcal{F} of tampering functions, the result of the execution will either be correct, or completely unrelated to the inputs of the participating parties.
In the synchronous setting the adversary is able to modify the messages being exchanged but cannot drop messages nor desynchronize the two parties by first running the protocol with the first party and then with the second party.
In this work, we define interactive non-malleable codes in the non-synchronous multi-party setting and construct such interactive non-malleable codes for the class \mathcal{F}^{s}_{\textsf{bounded}} of bounded-state tampering functions.
The construction is applicable to any multi-party protocol with a fixed message topology.

ePrint: https://eprint.iacr.org/2022/1004

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .