Apr 14, 2018 · Abstract page for arXiv paper 1804.05228: Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More.
Our results are the first explicit constructions of non-malleable codes in any of these tampering models. As applications, they also directly give non-malleable ...
We show that any non-malleable code in the interleaved 2-split state model gives a non-malleable secret-sharing scheme with binary shares. Secret- sharing ...
Nov 2, 2018 · Interleaved split-state tampering: Here the codeword is partitioned in an unknown way by an adversary, and then tampered with by a split-state ...
Two Source Extractors for Asymptotically Optimal Entropy, and (Many) More · Non-Malleable Extractors and Codes in the Interleaved Split-State Model and More.
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More ... non-Malleable codes in the split state model are introduced.
Dec 9, 2020 · We show that any non-malleable code in the interleaved 2-split state model gives a non-malleable secret-sharing scheme with binary shares.
Missing: Split- State
Nov 2, 2018 · Interleaved split-state tampering: Here the codeword is partitioned in an unknown way by an adversary, and then tampered with by a split-state ...
Non-malleable codes in the split-state model have found many applications in achieving security against physical (leakage and tampering) attacks [1,36], domain ...
Missing: Interleaved | Show results with:Interleaved
Nov 11, 2020 · Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition o... 254 views · 4 years ago ...more ...
Missing: Split- State