Improved non-malleable extractors, non-malleable codes and independent source extractors

From MaRDI portal
Publication:4978054

DOI10.1145/3055399.3055486zbMath1370.94527arXiv1608.00127OpenAlexW2964292782MaRDI QIDQ4978054

Xin Li

Publication date: 17 August 2017

Published in: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1608.00127




Related Items

Non-malleable codes for bounded parallel-time tamperingImproved computational extractors and their applicationsContinuous NMC secure against permutations and overwrites, with applications to CCA secure commitmentsPractical continuously non-malleable randomness encoders in the random oracle modelAn Efficient Reduction from Two-Source to Nonmalleable Extractors: Achieving Near-Logarithmic Min-EntropyContinuously non-malleable secret sharing for general access structuresInteractive non-malleable codesPrivacy amplification from non-malleable codesDistinct degrees and homogeneous sets(Nondeterministic) hardness vs. non-malleabilityExtractors: low entropy requirements colliding with non-malleabilityExplicit non-malleable codes from bipartite graphsUnnamed ItemContinuously non-malleable codes against bounded-depth tamperingUnnamed ItemNon-malleable encryption: simpler, shorter, strongerNonmalleable Extractors and Codes, with Their Many Tampered ExtensionsUnnamed ItemDistinct degrees in induced subgraphsContinuously non-malleable codes with split-state refreshUnnamed ItemUnnamed ItemFour-state non-malleable codes with explicit constant rateLow error efficient computational extractors in the CRS modelUnnamed ItemMulti-source non-malleable extractors and applicationsExplicit two-source extractors and resilient functionsTwo-Source Dispersers for Polylogarithmic Entropy and Improved Ramsey GraphsNon-malleability against polynomial tamperingNon-malleable secret sharing against bounded joint-tampering attacks in the plain model