170 likes | 480 Views
Explicit Non-Malleable Codes Resistant to Permutations. Shashank Agrawal (UIUC), Divya Gupta (UCLA), Hemanta Maji (UCLA), Omkant Pandey (UIUC), Manoj Prabhakaran (UIUC). Outline. N on-malleability and importance Non-malleable codes, brief survey, contribution More details. Non-Malleability.
E N D
Explicit Non-Malleable Codes Resistant to Permutations Shashank Agrawal (UIUC), Divya Gupta (UCLA), Hemanta Maji (UCLA), Omkant Pandey (UIUC), Manoj Prabhakaran (UIUC)
Outline • Non-malleability and importance • Non-malleable codes, brief survey, contribution • More details.
Non-Malleability • Cannot be easilychanged, influenced. • An important property required in several cryptographic applications. • Non-malleable encryption, signatures, commitments,… • Non-malleable code: • Difficult to change encoded message.
Encryption: Sealed-Bid Auction Public Key PK Encrypt (PK, $200) Encrypt (PK, $201) Unfair Advantage!! Image courtesy: http://gweedosplace.wordpress.com/
Signature: Man-in-the-Middle Pay $100 -Bob Pay $100*100*100 -Bob UIUC Grad Student
Non-Malleable codes • Tampering function family . • Experiment: • Informally, (Enc, Dec) an NM code if m* is either m or an unrelated value. Dec Enc m c c* = f(c) m*
Related Work • Granular/Compartmentalized Tampering. • Bit-wise independent tampering [DPW10, CG14b]. • Split-state model [DKO13,CG14b,ADL14]. • Global Tampering. • functions mapping n bits to n bits. • For families of smaller size • Inefficient encoding/decoding [DPW10, CG14a]. • Explicit constructions not available [FMVW14]. • Specific global tampering functions not considered.
Our Contribution • Tampering function can PERMUTE bits and perturb them. • EXPLICIT and efficient encoding/decoding procedure. • RATE 1. • Information-theoretic setting.
Detection/Correction? • In coding theory, error detection/correction important. • Family of constant functions where . • If c valid codeword, no way to even detect. • Easy to get non-malleability: Enc(m) = m. • NM codes don’t exist for all functions. • Decode the codeword, flip the first bit, encode it again.
Definition • Definition of Dziembowski et al. [ICS10] slightly complex. • We have a stronger, simpler definition: robust non-malleability. • Adversary specifies and a message . • Two requirements for all and : • Prob. c* invalid codeword independent of m, • If c* valid then m*=m with high probability. Dec Enc m c c* = f(c) m*
Tampering Family • Admissible channel: Transition probabilities are constants, but output should not be a fixed value. • Adversary can permute the bits in the codeword(global attack). • Then, pass each bit through an admissible channel. • Size of function family infinite! 1/2 0 0 0 0 0 0 1/2 1/2 1/2 1 1 1 1 1 1 Bit Flipping Random output Bit Fixing
Construction: Basic …… AG Codes …… Outer Code Balanced Unary Encoding …… Inner Code
Construction: Rate 1 • Encode m using Reed-Solomon codes to get . • H: almost universal hash-function family. • and . • .
Conclusion • Open problems: There are hardly any closed problems. • Our NM code has applications to NM commitments. • Other interesting families that may have applications to cryptography. • Paper would be on eprint very soon. Keep looking.
Thank you Questions?