Improved, black-box, non-malleable encryption from semantic security

被引:3
|
作者
Choi, Seung Geol [1 ]
Dachman-Soled, Dana [2 ]
Malkin, Tal [3 ]
Wee, Hoeteck [4 ]
机构
[1] US Naval Acad, Annapolis, MD 21402 USA
[2] Univ Maryland, College Pk, MD 20742 USA
[3] Columbia Univ, New York, NY USA
[4] Ecole Normale Super, CNRS, DIENS, Paris, France
基金
美国国家科学基金会;
关键词
Public-key encryption; Non-malleable encryption; Black-box construction; PUBLIC-KEY ENCRYPTION; CHOSEN-CIPHERTEXT SECURITY; CONSTRUCTION; SCHEME;
D O I
10.1007/s10623-017-0348-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give a new black-box transformation from any semantically secure encryption scheme into a non-malleable one which has a better rate than the best previous work of Coretti et al. (in: Kushilevitz and Malkin (eds) TCC 2016-A, Part I, Springer, Heidelberg, 2016). We achieve a better rate by departing from the "matrix encoding" methodology used by previous constructions, and working directly with a single codeword. We also use a Shamir secret-share packing technique to improve the rate of the underlying error-correcting code.
引用
收藏
页码:641 / 663
页数:23
相关论文
共 50 条
  • [41] Non-Malleable Codes from the Wire-Tap Channel
    Chabanne, Herve
    Cohen, Gerard
    Flori, Jean-Pierre
    Patey, Alain
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [42] Black-Box Fuzzing for Security in Managed Networks: An Outline
    Fernandez, Leon
    Karlsson, Gunnar
    IEEE Networking Letters, 2023, 5 (04): : 241 - 244
  • [43] Lattice-based completely non-malleable public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    Designs, Codes and Cryptography, 2014, 71 : 293 - 313
  • [44] DejaVu: Bringing Black-box Security Analytics to Cloud
    Nadgowda, Shripad
    Isci, Canturk
    Bal, Mustafa
    MIDDLEWARE INDUSTRY'18: PROCEEDINGS OF THE 2018 ACM/IFIP/USENIX MIDDLEWARE CONFERENCE (INDUSTRIAL TRACK), 2018, : 17 - 24
  • [45] Black-box composition does not imply adaptive security
    Myers, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 189 - 206
  • [46] Non-malleable Codes from Two-Source Extractors
    Dziembowski, Stefan
    Kazana, Tomasz
    Obremski, Maciej
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 239 - 257
  • [47] Non-malleable Codes from Leakage Resilient Cryptographic Primitives
    Ghosal, Anit Kumar
    Chowdhury, Dipanwita Roy
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 272 - 290
  • [48] Lattice-based completely non-malleable public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 293 - 313
  • [49] Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications
    Li, Zeju
    Liu, Xinghan
    Nan, Guoshun
    Zhou, Jinfei
    Lyu, Xinchen
    Cui, Qimei
    Tao, Xiaofeng
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 5614 - 5619
  • [50] From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes
    Coretti, Sandro
    Maurer, Ueli
    Tackmann, Bjoern
    Venturi, Daniele
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 532 - 560