Non-Malleable Codes against Active Physical Layer Adversary. Lin, F., Safavi-Naini, R., Cheraghchi, M., & Wang, H. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), pages 2753–2757, 2019. Link doi abstract bibtex Non-malleable codes are randomized codes that protect coded messages against modification by functions in a tampering function class. These codes are motivated by providing tamper resilience in applications where a cryptographic secret is stored in a tamperable storage device and the protection goal is to ensure that the adversary cannot benefit from their physical tampering with the device. In this paper we consider nonmalleable codes for protection of secure communication against active physical layer adversaries. We define a class of functions that closely model tampering of communication by adversaries who can eavesdrop on a constant fraction of the transmitted codeword, and use this information to select a vector of tampering functions that will be applied to a second constant fraction of codeword components (possibly overlapping with the first set). We derive rate bounds for non-malleable codes for this function class and give a modular construction that adapts and provides new analysis for an existing construction in the new setting. We discuss our results and directions for future work.
@INPROCEEDINGS{ref:LSCW19,
author = {Fuchun Lin and Reihaneh Safavi-Naini and Mahdi
Cheraghchi and Huaxiong Wang},
title = {Non-Malleable Codes against Active Physical Layer
Adversary},
year = 2019,
doi = {10.1109/ISIT.2019.8849438},
booktitle = {Proceedings of the {IEEE International Symposium on
Information Theory (ISIT)}},
pages = {2753--2757},
url_Link = {https://ieeexplore.ieee.org/document/8849438},
abstract = {Non-malleable codes are randomized codes that
protect coded messages against modification by
functions in a tampering function class. These codes
are motivated by providing tamper resilience in
applications where a cryptographic secret is stored
in a tamperable storage device and the protection
goal is to ensure that the adversary cannot benefit
from their physical tampering with the device. In
this paper we consider nonmalleable codes for
protection of secure communication against active
physical layer adversaries. We define a class of
functions that closely model tampering of
communication by adversaries who can eavesdrop on a
constant fraction of the transmitted codeword, and
use this information to select a vector of tampering
functions that will be applied to a second constant
fraction of codeword components (possibly
overlapping with the first set). We derive rate
bounds for non-malleable codes for this function
class and give a modular construction that adapts
and provides new analysis for an existing
construction in the new setting. We discuss our
results and directions for future work. }
}
Downloads: 0
{"_id":"TdZn9rS8A4Kj9mpH5","bibbaseid":"lin-safavinaini-cheraghchi-wang-nonmalleablecodesagainstactivephysicallayeradversary-2019","authorIDs":["2n8MNophuzbeevTa8","3NEcSaujokmJYSDaa","3tFWxWs2qWeYAZx9a","4QNcMTdRiWr2gs8Sk","5KoQWR3vSjnsoZNz5","5i4QHRc5LGio8Mf5u","62bYDgAFwCxaQ4Q9T","685mTysGDdQJKGxEE","6sX76eTffL7p76peN","8NLx3B3FAvaK54hSK","9NZpjMJLG7dNWroGm","9aD4MPX9ELhsyJmaR","9aFgrqcc4j28kZn8n","A9wAgP7TPK9tw28qY","BJ6h7zrsT3L89RKSg","BWL9E9QxvrST7y7ym","Cht4qGZ9eYAvPygNC","D3NMRJpac7Z2oFz7x","EiL6Xv4GTWGB97B8H","F3Y934eNyTeEJsg6E","FDEj5Zwdm28pFcAnB","FJdyLy2TL3v973ge8","GxccwstJJuJ4rg7Dq","H4D7r27RcPALT5DCs","HP7szFXWBWFXXZhdA","HRX7xsd7ZkTNvr67D","Hj3KN5PTNMST8hD3b","JEvEPvDBYNNXgGBnp","JYpde2ppjXLva6cre","KFgC2dZG7jXYAgZ3T","NRg9mmaSB55QqzNnH","NWCEkq6XqRBCiGmMe","NpGaG45evixRFDMiF","NyDiXeBc7cuxdWrqh","P6pva6vpPZCz6ndh9","Py2jfYGNZKNt7nxL6","Q6E9aDkYPcbhngLMx","QYrXKExv3BPABZGyA","QupQWsidagmv2nu8Z","SGZ2YignSm7njeTxy","SSuyWxzudqBDgAosw","THz3CmRmH3zZ9Xfud","TTEBJzPHwrY4d2Qfi","Wzr7kB4bxMDqceidA","YedfCw6zcDLoWAWFL","YtTEuSL9GJ8pkKcZw","Z3w2d32WjDczZMeGo","aduB2YE7dcNtbHnAN","c8gPvTXFPd9NazgEw","d6HAadRZAtz97Y2so","dTBDNYCcYKNNdhqaR","ezDt3Lb3Q6Sbo2rfX","fXtxgjbjZswBmF45i","ftBpmnKRHoB2muB8u","gKxHau44e8gnmxs6v","hM29eSWZbASnmDdFf","hw7Q4GHDAHkLTAyeB","i6Ns5rSW8R3ifxeHg","jJcoL4QWRkJQ59LfW","kKvRZ55rH7sfbubS2","kdfqsAMqCFDhpuW3S","koPTGcsAkwhGbkAYe","manxWg6Q3ZC5vW4JE","pwN2yYKo5DdSDaZGs","qpSgMrJ8WQNupjbXX","sD5Wq95oeSzqGF9kn","uSGLWGoXjyDyozeEy","wCcpScxkvg5RkcmWm","xKz7kx4eXbnkHeNXP","xeiij9YsbXBbMjciP","yGxZz3yuu6krMRxgK","yjJrpKY5QmDe8SXvm","zaR6PwJ7aC9xWBpiy"],"author_short":["Lin, F.","Safavi-Naini, R.","Cheraghchi, M.","Wang, H."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Fuchun"],"propositions":[],"lastnames":["Lin"],"suffixes":[]},{"firstnames":["Reihaneh"],"propositions":[],"lastnames":["Safavi-Naini"],"suffixes":[]},{"firstnames":["Mahdi"],"propositions":[],"lastnames":["Cheraghchi"],"suffixes":[]},{"firstnames":["Huaxiong"],"propositions":[],"lastnames":["Wang"],"suffixes":[]}],"title":"Non-Malleable Codes against Active Physical Layer Adversary","year":"2019","doi":"10.1109/ISIT.2019.8849438","booktitle":"Proceedings of the IEEE International Symposium on Information Theory (ISIT)","pages":"2753–2757","url_link":"https://ieeexplore.ieee.org/document/8849438","abstract":"Non-malleable codes are randomized codes that protect coded messages against modification by functions in a tampering function class. These codes are motivated by providing tamper resilience in applications where a cryptographic secret is stored in a tamperable storage device and the protection goal is to ensure that the adversary cannot benefit from their physical tampering with the device. In this paper we consider nonmalleable codes for protection of secure communication against active physical layer adversaries. We define a class of functions that closely model tampering of communication by adversaries who can eavesdrop on a constant fraction of the transmitted codeword, and use this information to select a vector of tampering functions that will be applied to a second constant fraction of codeword components (possibly overlapping with the first set). We derive rate bounds for non-malleable codes for this function class and give a modular construction that adapts and provides new analysis for an existing construction in the new setting. We discuss our results and directions for future work. ","bibtex":"@INPROCEEDINGS{ref:LSCW19,\n author =\t {Fuchun Lin and Reihaneh Safavi-Naini and Mahdi\n Cheraghchi and Huaxiong Wang},\n title =\t {Non-Malleable Codes against Active Physical Layer\n Adversary},\n year =\t 2019,\n doi =\t\t {10.1109/ISIT.2019.8849438},\n booktitle =\t {Proceedings of the {IEEE International Symposium on\n Information Theory (ISIT)}},\n pages =\t {2753--2757},\n url_Link =\t {https://ieeexplore.ieee.org/document/8849438},\n abstract =\t {Non-malleable codes are randomized codes that\n protect coded messages against modification by\n functions in a tampering function class. These codes\n are motivated by providing tamper resilience in\n applications where a cryptographic secret is stored\n in a tamperable storage device and the protection\n goal is to ensure that the adversary cannot benefit\n from their physical tampering with the device. In\n this paper we consider nonmalleable codes for\n protection of secure communication against active\n physical layer adversaries. We define a class of\n functions that closely model tampering of\n communication by adversaries who can eavesdrop on a\n constant fraction of the transmitted codeword, and\n use this information to select a vector of tampering\n functions that will be applied to a second constant\n fraction of codeword components (possibly\n overlapping with the first set). We derive rate\n bounds for non-malleable codes for this function\n class and give a modular construction that adapts\n and provides new analysis for an existing\n construction in the new setting. We discuss our\n results and directions for future work. }\n}\n\n","author_short":["Lin, F.","Safavi-Naini, R.","Cheraghchi, M.","Wang, H."],"key":"ref:LSCW19","id":"ref:LSCW19","bibbaseid":"lin-safavinaini-cheraghchi-wang-nonmalleablecodesagainstactivephysicallayeradversary-2019","role":"author","urls":{" link":"https://ieeexplore.ieee.org/document/8849438"},"metadata":{"authorlinks":{"cheraghchi, m":"https://mahdi.ch/"}}},"bibtype":"inproceedings","biburl":"http://mahdi.ch/writings/cheraghchi.bib","creationDate":"2020-05-28T18:49:14.921Z","downloads":6,"keywords":[],"search_terms":["non","malleable","codes","against","active","physical","layer","adversary","lin","safavi-naini","cheraghchi","wang"],"title":"Non-Malleable Codes against Active Physical Layer Adversary","year":2019,"dataSources":["YZqdBBx6FeYmvQE6D"]}