skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
Abstract Non-malleable codes were introduced by Dziembowski et al. (in: Yao (ed) ICS2010, Tsinghua University Press, 2010), and its main application is the protection of cryptographic devices against tampering attacks on memory. In this work, we initiate a comprehensive study on non-malleable codes for the class of partial functions, that read/write on an arbitrary subset of codeword bits with specific cardinality. We present two constructions: the first one is in the CRS model and allows the adversary to selectively choose the subset of codeword bits, while the latter is in the standard model and adaptively secure. Our constructions are efficient in terms of information rate, while allowing the attacker to access asymptotically almost the entire codeword. In addition, they satisfy a notion which is stronger than non-malleability, that we call non-malleability with manipulation detection, guaranteeing that any modified codeword decodes to either the original message or to$$\bot $$ . We show that our primitive implies All-Or-Nothing Transforms (AONTs), and as a result our constructions yield efficient AONTs under standard assumptions (only one-way functions), which, to the best of our knowledge, was an open question until now. Furthermore, we construct a notion of continuous non-malleable codes (CNMC), namely CNMC with light updates, that avoids the full re-encoding process and only uses shuffling and refreshing operations. Finally, we present a number of additional applications of our primitive in tamper resilience.  more » « less
Award ID(s):
2402031
PAR ID:
10608673
Author(s) / Creator(s):
; ;
Publisher / Repository:
Springer
Date Published:
Journal Name:
Journal of Cryptology
Volume:
37
Issue:
2
ISSN:
0933-2790
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract CSS-T codes were recently introduced as quantum error-correcting codes that respect a transversal gate. A CSS-T code depends on a CSS-T pair, which is a pair of binary codes$$(C_1, C_2)$$ ( C 1 , C 2 ) such that$$C_1$$ C 1 contains$$C_2$$ C 2 ,$$C_2$$ C 2 is even, and the shortening of the dual of$$C_1$$ C 1 with respect to the support of each codeword of$$C_2$$ C 2 is self-dual. In this paper, we give new conditions to guarantee that a pair of binary codes$$(C_1, C_2)$$ ( C 1 , C 2 ) is a CSS-T pair. We define the poset of CSS-T pairs and determine the minimal and maximal elements of the poset. We provide a propagation rule for nondegenerate CSS-T codes. We apply some main results to Reed–Muller, cyclic and extended cyclic codes. We characterize CSS-T pairs of cyclic codes in terms of the defining cyclotomic cosets. We find cyclic and extended cyclic codes to obtain quantum codes with better parameters than those in the literature. 
    more » « less
  2. Abstract We study the open, closed, and non-degenerate embedding dimensions of neural codes, which are the smallest respective dimensions in which one can find a realization of a code consisting of convex sets that are open, closed, or non-degenerate in a sense defined by Cruz, Giusti, Itskov, and Kronholm. For a given code$$\mathcal {C}$$ C we define the embedding dimension vector to be the triple (a, b, c) consisting of these embedding dimensions. Existing results guarantee that$$\max {\{a,b\}}\le c$$ max { a , b } c , and we show that when any of these dimensions is at least 2 this is the only restriction on such vectors. Specifically, for every triple (a, b, c) with$$2\le \min {\{a,b\}}$$ 2 min { a , b } and$$\max {\{a,b\}}\le c\le \infty $$ max { a , b } c we construct a code$$\mathcal {C}_{(a,b,c)}$$ C ( a , b , c ) whose embedding dimension vector is exactly (a, b, c) (where an embedding dimension is$$\infty $$ if there is no realization of the corresponding type). Our constructions combine two existing tools in the convex neural codes literature: sunflowers of convex open sets, and rigid structures, the latter of which was recently defined in work of Chan, Johnston, Lent, Ruys de Perez, and Shiu. Our constructions provide the first examples of codes whose closed embedding dimension is larger than their open embedding dimension, but still finite. 
    more » « less
  3. Abstract LetEbe an elliptic curve over$${{\mathbb {Q}}}$$ Q . We conjecture asymptotic estimates for the number of vanishings of$$L(E,1,\chi )$$ L ( E , 1 , χ ) as$$\chi $$ χ varies over all primitive Dirichlet characters of orders 4 and 6, subject to a mild hypothesis onE. Our conjectures about these families come from conjectures about random unitary matrices as predicted by the philosophy of Katz-Sarnak. We support our conjectures with numerical evidence. Compared to earlier work by David, Fearnley and Kisilevsky that formulated analogous conjectures for characters of any odd prime order, in the composite order case, we need to justify our use of random matrix theory heuristics by analyzing the equidistribution of the squares of normalized Gauss sums. To do this, we introduce the notion of totally order$$\ell $$ characters to quantify how quickly the quartic and sextic Gauss sums become equidistributed. Surprisingly, the rate of equidistribution in the full family of quartic (resp., sextic) characters is much slower than in the sub-family of totally quartic (resp., sextic) characters. We provide a conceptual explanation for this phenomenon by observing that the full family of order$$\ell $$ twisted elliptic curveL-functions, with$$\ell $$ even and composite, is a mixed family with both unitary and orthogonal aspects. 
    more » « less
  4. Abstract In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (t, e)-composite-asymmetric error-correcting codes ((t, e)-CAECCs). Let$$\mathcal {X}$$ X be an$$m \times n$$ m × n binary matrix in which each row has Hamming weightw. If at mosttrows of$$\mathcal {X}$$ X contain errors, and in each erroneous row, there are at mosteoccurrences of$$1 \rightarrow 0$$ 1 0 errors, we say that a (t, e)-composite-asymmetric error occurs in$$\mathcal {X}$$ X . For general values ofm, n, w, t, ande, we propose new constructions of (t, e)-CAECCs with redundancy at most$$(t-1)\log (m) + O(1)$$ ( t - 1 ) log ( m ) + O ( 1 ) , whereO(1) is independent of the code lengthm. In particular, this yields a class of (2, e)-CAECCs that are optimal in terms of redundancy. Whenmis a prime power, the redundancy can be further reduced to$$(t-1)\log (m) - O(\log (m))$$ ( t - 1 ) log ( m ) - O ( log ( m ) ) . To further increase the code size, we introduce a combinatorial object called a weak$$B_e$$ B e -set. When$$e = w$$ e = w , we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size ist! or an exponential function oft, there exist list-decodable (t, e)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3, 2)-CAECCs with redundancy$$\log (m) + O(1)$$ log ( m ) + O ( 1 )
    more » « less
  5. Abstract We study the sparsity of the solutions to systems of linear Diophantine equations with and without non-negativity constraints. The sparsity of a solution vector is the number of its nonzero entries, which is referred to as the$$\ell _0$$ 0 -norm of the vector. Our main results are new improved bounds on the minimal$$\ell _0$$ 0 -norm of solutions to systems$$A\varvec{x}=\varvec{b}$$ A x = b , where$$A\in \mathbb {Z}^{m\times n}$$ A Z m × n ,$${\varvec{b}}\in \mathbb {Z}^m$$ b Z m and$$\varvec{x}$$ x is either a general integer vector (lattice case) or a non-negative integer vector (semigroup case). In certain cases, we give polynomial time algorithms for computing solutions with$$\ell _0$$ 0 -norm satisfying the obtained bounds. We show that our bounds are tight. Our bounds can be seen as functions naturally generalizing the rank of a matrix over$$\mathbb {R}$$ R , to other subdomains such as$$\mathbb {Z}$$ Z . We show that these new rank-like functions are all NP-hard to compute in general, but polynomial-time computable for fixed number of variables. 
    more » « less