Capacity of non-malleable codes

From MaRDI portal
Revision as of 21:05, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2988875

DOI10.1145/2554797.2554814zbMath1366.68042arXiv1309.0458OpenAlexW2279000475MaRDI QIDQ2988875

Mahdi Cheraghchi, Venkatesan Guruswami

Publication date: 19 May 2017

Published in: Proceedings of the 5th conference on Innovations in theoretical computer science (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1309.0458




Related Items (26)

Constructing locally leakage-resilient linear secret-sharing schemesContinuous NMC secure against permutations and overwrites, with applications to CCA secure commitmentsPractical continuously non-malleable randomness encoders in the random oracle modelContinuously non-malleable secret sharing for general access structuresInteractive non-malleable codesPrivacy amplification from non-malleable codesThe Chaining Lemma and Its Application(Nondeterministic) hardness vs. non-malleabilityNon-malleable encryption: simpler, shorter, strongerCodes for Detection of Limited View Algebraic TamperingAffine-evasive sets modulo a primeNon-Malleable Codes from Additive CombinatoricsBounded tamper resilience: how to go beyond the algebraic barrierNon-malleable coding against bit-wise and split-state tamperingTight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable CodesTight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light UpdatesContinuously non-malleable codes with split-state refreshUnnamed ItemFour-state non-malleable codes with explicit constant rateInformation-Theoretic Local Non-malleable Codes and Their ApplicationsOptimal Computational Split-state Non-malleable CodesLocally decodable and updatable non-malleable codes and their applicationsMulti-source non-malleable extractors and applicationsNon-malleability against polynomial tamperingNon-malleable secret sharing against bounded joint-tampering attacks in the plain model




Cites Work




This page was built for publication: Capacity of non-malleable codes