a new security proof for fmnv continuous non-malleable encoding scheme
نویسندگان
چکیده
a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already been formalized and defined in current literature, among which continuous non-malleability is the setupin which the messages are protected against adversaries who may issue polynomially many tampering queries. the first continuousnon-malleable encoding scheme has been proposed by faust et. al. (fmnv) in 2014.in this article, we propose a new proof of continuous non-malleability of the fmnv scheme, while the new proof will also giverise to an improved and more efficient version of this scheme. the new proof also shows that one may achieve continuous nonmalleability of the same security by using a leakage resilient storage scheme with (about (k + 1)(log(q) − 2)) fewer bits for theleakage bound (where k is the output size of the collision resistant hash function and q is the maximum number of tamperingqueries). this shows that the new scheme is more efficient and practical for tamper-resilient applications.
منابع مشابه
A new security proof for FMNV continuous non-malleable encoding scheme
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...
متن کاملStrong Continuous Non-malleable Encoding Schemes with Tamper-Detection
A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is resilient to attacks containing more than one tampering procedure. Also, such a scheme is said to have tamper-detection property if any kind of tampering attack is detected. In [S. Faust, et al., Continuous nonmalleable codes, TCC...
متن کاملContinuous Non-malleable Codes
Non-malleable codes are a natural relaxation of error correcting/detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the ...
متن کاملTamper Detection and Continuous Non-malleable Codes
We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a codeword c = Enc(m). The codeword can be adversarially tampered via a function f ∈ F from some “tampering function family” F , resulting in a tampered value c′ = f(c). We study the different types of security guarantees that can be achieved in this scenario for different families F of tampering atta...
متن کاملA new security proof for Damgård's ElGamal
We provide a new security proof for a variant of ElGamal proposed by Damg̊ard, showing that it is secure against non-adaptive chosen ciphertext. Unlike previous security proofs for this cryptosystem, which rely on somewhat problematic assumptions, our computational problem is similar to accepted problems such the Gap and Decision Diffie-Hellman problems.
متن کاملA Straight-Line Extractable Non-malleable Commitment Scheme
Non-malleability is an important security property of commitment schemes. The property means security against the man-in-the-middle attack, and it is defined and proved in the simulation paradigm using the corresponding simulator. Many known non-malleable commitment schemes have the common drawback that their corresponding simulators do not work in a straight-line manner, requires rewinding of ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
isecure, the isc international journal of information securityجلد ۹، شماره ۱، صفحات ۴۱-۵۱
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023