Non-malleable codes in the split-state model Divesh Aggarwal, - - PowerPoint PPT Presentation

non malleable codes in the split state model
SMART_READER_LITE
LIVE PREVIEW

Non-malleable codes in the split-state model Divesh Aggarwal, - - PowerPoint PPT Presentation

Non-malleable codes in the split-state model Divesh Aggarwal, Yevgeniy Dodis , Tomasz Kazana, Shachar Lovett, Maciej Obremski New York University Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) Consider a


slide-1
SLIDE 1

Non-malleable codes in the split-state model

Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Shachar Lovett, Maciej Obremski

New York University

slide-2
SLIDE 2

Tampering Experiment

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

  • Consider a tamperable communication channel.
slide-3
SLIDE 3

Tampering Experiment

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

  • Consider a tamperable communication channel.
  • To protect, send c = Enc(m) along the channel.
slide-4
SLIDE 4

Tampering Experiment

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

  • Consider a tamperable communication channel.
  • To protect, send c = Enc(m) along the channel.
  • The tampered codeword decodes to some m∗.
slide-5
SLIDE 5

Tampering Experiment

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

  • Consider a tamperable communication channel.
  • To protect, send c = Enc(m) along the channel.
  • The tampered codeword decodes to some m∗.
  • Hope:

m∗ "looks like" g(m) for some "good" g that we can "tolerate".

slide-6
SLIDE 6

Tampering Experiment

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

  • Consider a tamperable communication channel.
  • To protect, send c = Enc(m) along the channel.
  • The tampered codeword decodes to some m∗.
  • Hope:

m∗ "looks like" g(m) for some "good" g that we can "tolerate". We want

◮ Correctness: ∀m, Dec(Enc(m)) = m. ◮ Simulation: ∀ f ∈ F,

∃ g ∈ G, where

◮ F is large and realistic against attacks/channels. ◮ G small and "easy to handle".

slide-7
SLIDE 7

Example: Error-correcting codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

F G

(m) = m Id

◮ G = {Id} is “easy to handle".

slide-8
SLIDE 8

Example: Error-correcting codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) ∆ ρ

F G

(m) = m Id (c, ) <= c*

◮ G = {Id} is “easy to handle". ◮ F realistic/useful. ◮ Constructions: Hadamard, Reed-Solomon, Reed-Muller, etc..

slide-9
SLIDE 9

Example: Error-detecting codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

F G

(m) = m (m) = Id

AMD Codes: Application in robust fuzzy extractors and secret sharing [CDFPW12], NM-codes [DPW10], etc.

slide-10
SLIDE 10

Example: Error-detecting codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

F G

(m) = m (m) = Id

∆( c, )<=

c*

2ρ Same constructions as those for ECC.secret sharing [CDFPW12], NM-codes [DPW10], etc.

slide-11
SLIDE 11

Example: Error-detecting codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

F G

(m) = m (m) = (c) = c + Id f δ

δ

AMD Codes: Application in robust fuzzy extractors and secret sharing [CDFPW12], NM-codes [DPW10], etc.

slide-12
SLIDE 12

Error-correction/detection impossible

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

F G

(m) = m (m) = Id (c) = c*

c*

f

??

Constant functions

Let c∗ = Enc(m′) for some fixed m′. Thus, Dec(c∗) = m′ / ∈ {m, ⊥}.

slide-13
SLIDE 13

Error-correction/detection impossible

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

F G

(m) = m (m) = Id (c) = c*

c*

f Constant functions

Let c∗ = Enc(m′) for some fixed m′. Thus, Dec(c∗) = m′ / ∈ {m, ⊥}.

slide-14
SLIDE 14

Non-malleable codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

NM

Id (m) = m

g

m*

(m) = m*

F

slide-15
SLIDE 15

Non-malleable codes

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

NM

Id (m) = m

g

m*

(m) = m*

F

Is NM "realistic/easy-to-handle"? When is it useful?

slide-16
SLIDE 16

Application of Non-malleable codes

◮ Consider Signsk(userID, m). ◮ Task: How to protect sk against tampering attack. ◮ Encode sk using non-malleable code. ◮ Thus, sk∗ = Dec(f(Enc(sk))) is either equal to sk or unrelated. ◮ Thus, cannot use Signsk∗(userID, ·) to forge Signsk(userID’ , ·).

slide-17
SLIDE 17

Non-malleable codes: Formal Definition

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The coding scheme is non-malleable w.r.t. family F , if ∀f ∈ F,

slide-18
SLIDE 18

Non-malleable codes: Formal Definition

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The coding scheme is non-malleable w.r.t. family F , if ∀f ∈ F, ∃T which is a probabilistic combination of:

◮ constant

functions

◮ identity

function s.t.

slide-19
SLIDE 19

Non-malleable codes: Formal Definition

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The coding scheme is non-malleable w.r.t. family F , if ∀f ∈ F, ∃T which is a probabilistic combination of:

◮ constant

functions

◮ identity

function s.t. ∀m ∈ M, m∗ ≈ T(m) .

slide-20
SLIDE 20

Non-malleable codes: Formal Definition

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The coding scheme is non-malleable w.r.t. family F , if ∀f ∈ F, ∃T which is a probabilistic combination of:

◮ constant

functions

◮ identity

function s.t. ∀m ∈ M, m∗ ≈ T(m) . Note: T is independent of m. Thus, intuitively, either m∗ = m

  • r they are unrelated.
slide-21
SLIDE 21

Which realistic families F can we tolerate?

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

NM

Id (m) = m

g

m*

(m) = m*

Fall

Impossible [DPW10]. ∀ g ∈ Fall, let f(c) = Enc(g(Dec(c))).

slide-22
SLIDE 22

Which realistic families F can we tolerate?

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal)

Fall

all

F

Impossible [DPW10]. ∀ g ∈ Fall, let f(c) = Enc(g(Dec(c))).

slide-23
SLIDE 23

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently

slide-24
SLIDE 24

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing

slide-25
SLIDE 25

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering

functions but much more

slide-26
SLIDE 26

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering

functions but much more

◮ Existential result known [DPW10].

slide-27
SLIDE 27

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering

functions but much more

◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions

(t = k, the no. of bits in m) [DPW10, CG14, FNVW14].

slide-28
SLIDE 28

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering

functions but much more

◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions

(t = k, the no. of bits in m) [DPW10, CG14, FNVW14].

◮ Efficient construction for t = 2, k = 1 [DKO13]

slide-29
SLIDE 29

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering

functions but much more

◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions

(t = k, the no. of bits in m) [DPW10, CG14, FNVW14].

◮ Efficient construction for t = 2, k = 1 [DKO13] ◮ Open Question: Efficient construction for t constant, k large.

slide-30
SLIDE 30

Non-malleable Codes in the t-split-state model

◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering

functions but much more

◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions

(t = k, the no. of bits in m) [DPW10, CG14, FNVW14].

◮ Efficient construction for t = 2, k = 1 [DKO13] ◮ Open Question: Efficient construction for t constant, k large.

YES (this talk). We show several constructions, including t = 2 and constant rate (i.e. code length is Θ(k)).

slide-31
SLIDE 31

NM-codes in the t-split state model

m Enc Dec m* X X X X1

2 3 4

X5 X*

4 5

X*

3

X* X*

2

X*

1

f1

2

f f 3

4

f f5

The coding scheme is non-malleable w.r.t. family Ft-split , if ∀ f1, . . . , ft, ∃T which is a probabilistic combination of:

◮ constant

functions

◮ identity

function s.t. ∀m ∈ M, m∗ ≈ T(m) .

slide-32
SLIDE 32

Common outline for our results: Non-malleable reductions [ADKO15]

slide-33
SLIDE 33

Non-malleable Reduction: Definition [ADKO15]

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

slide-34
SLIDE 34

Non-malleable Reduction: Definition [ADKO15]

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The scheme is a non-malleable reduction from F to G , denoted as F ⇒ G if ∀f ∈ F,

slide-35
SLIDE 35

Non-malleable Reduction: Definition [ADKO15]

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The scheme is a non-malleable reduction from F to G , denoted as F ⇒ G if ∀f ∈ F, ∃G which is a probabilistic combination of functions in G .

slide-36
SLIDE 36

Non-malleable Reduction: Definition [ADKO15]

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The scheme is a non-malleable reduction from F to G , denoted as F ⇒ G if ∀f ∈ F, ∃G which is a probabilistic combination of functions in G . ∀m ∈ M, m∗ ≈ G(m) .

slide-37
SLIDE 37

Non-malleable Reduction: Definition [ADKO15]

Let (Enc, Dec) be a coding scheme with Enc randomized, and Dec deterministic, s.t. ∀m Dec(Enc(m)) = m,

f c m m* c* Dec Enc (m) m g g

(Real) (Ideal) The scheme is a non-malleable reduction from F to G , denoted as F ⇒ G if ∀f ∈ F, ∃G which is a probabilistic combination of functions in G . ∀m ∈ M, m∗ ≈ G(m) . An NM-code for F can be viewed as F ⇒ NM , where NM is the function family comprising of

◮ constant

functions

◮ identity

function

slide-38
SLIDE 38

Non-malleable Reduction: Composability

Theorem

For all F, G, H, we have that F ⇒ G, and G ⇒ H, implies F ⇒ H .

slide-39
SLIDE 39

Non-malleable Reduction: Composability

Theorem

For all F, G, H, we have that F ⇒ G, and G ⇒ H, implies F ⇒ H .

NM

(m) = m Id

(m) = m*

m*

g

F G H Make families simpler, until non-malleable.

slide-40
SLIDE 40

Our results

F

split NM aff

F F F

la bit

[ADL14] [ADL14, A14] [CG14, CZ14] [ADKO14] [ADKO14]

ADL14 gives a scheme for encoding k-bit messages to Θ(k7)-bit codewords. ADKO15 gives a scheme for encoding k-bit messages to Θ(k)-bit codewords.

slide-41
SLIDE 41

Two simplifying assumptions for the talk

◮ Will only describe the decoding procedure.

slide-42
SLIDE 42

Two simplifying assumptions for the talk

◮ Will only describe the decoding procedure.

◮ Enc(m) is a random c such that Dec(c) = m.

slide-43
SLIDE 43

Two simplifying assumptions for the talk

◮ Will only describe the decoding procedure.

◮ Enc(m) is a random c such that Dec(c) = m. ◮ Subtlety: Enc might be inefficient.

slide-44
SLIDE 44

Two simplifying assumptions for the talk

◮ Will only describe the decoding procedure.

◮ Enc(m) is a random c such that Dec(c) = m. ◮ Subtlety: Enc might be inefficient. ◮ This can be a problem at times, but for our constructions,

we can get around it.

slide-45
SLIDE 45

Two simplifying assumptions for the talk

◮ Will only describe the decoding procedure.

◮ Enc(m) is a random c such that Dec(c) = m. ◮ Subtlety: Enc might be inefficient. ◮ This can be a problem at times, but for our constructions,

we can get around it.

◮ Argue non-malleability only for a uniformly random message M.

slide-46
SLIDE 46

Fsplit ⇒ Faffine

U = UFp, p = poly(k) is a prime Enc1(U) = L, R ∈ Fn

p

s.t. L, R = U, n = poly(log k). U R

1

Enc L f g L* R* Dec1 <L*, R*> We show: ∀ f, g, (L, R, f(L), g(R)) ≈ (U, Af,gU + Bf,g) .

slide-47
SLIDE 47

Proof Step 1: Partitioning Lemma

Fix f, g. Let φ(L, R) := (L, R, f(L), g(R)) D := {D : D is a conv. comb. of (U, aU + b), a, b ∈ F}

B G G G G

S S S S S S

1 4 5 6 7

Fp

n

Fp

n G

2

S S

B

8 3

S

G

It is enough to partition Fn

p × Fn p into

"good" and "bad" rectangles such that

◮ If S is a good set, then

φ(L, R)|(L,R)∈S is close to some distribution in D.

◮ The union of all bad sets has

size much smaller than p2n.

slide-48
SLIDE 48

Our partitioning

We partition Fn

p × Fn p into four type of rectangles.

  • Type 1: g(R) = a

for some a ∈ Fn

  • p. Then

φ = (L, R , f(L), g(R)) is close to (UFp, f(L), a) which belongs to D.

slide-49
SLIDE 49

Our partitioning

We partition Fn

p × Fn p into four type of rectangles.

  • Type 1: g(R) = a

for some a ∈ Fn

  • p. Then

φ = (L, R , f(L), g(R)) is close to (UFp, f(L), a) which belongs to D.

  • Type 2: φ = (L, R , f(L), g(R)) is close to UF2

p, which belongs to D.

slide-50
SLIDE 50

Our partitioning

We partition Fn

p × Fn p into four type of rectangles.

  • Type 1: g(R) = a

for some a ∈ Fn

  • p. Then

φ = (L, R , f(L), g(R)) is close to (UFp, f(L), a) which belongs to D.

  • Type 2: φ = (L, R , f(L), g(R)) is close to UF2

p, which belongs to D.

  • Type 3: f(L) = AL

for some A ∈ Fn×n

p

, and ATg(R) = cR + d , for c ∈ Fp , and d ∈ Fn

p , which implies

φ = (L, R , cL, R + L, d) , which is in D if the partition S is large enough.

slide-51
SLIDE 51

Our partitioning

We partition Fn

p × Fn p into four type of rectangles.

  • Type 1: g(R) = a

for some a ∈ Fn

  • p. Then

φ = (L, R , f(L), g(R)) is close to (UFp, f(L), a) which belongs to D.

  • Type 2: φ = (L, R , f(L), g(R)) is close to UF2

p, which belongs to D.

  • Type 3: f(L) = AL

for some A ∈ Fn×n

p

, and ATg(R) = cR + d , for c ∈ Fp , and d ∈ Fn

p , which implies

φ = (L, R , cL, R + L, d) , which is in D if the partition S is large enough.

  • Type 4: Bad sets.
slide-52
SLIDE 52

Our partitioning

We partition Fn

p × Fn p into four type of rectangles.

  • Type 1: g(R) = a

for some a ∈ Fn

  • p. Then

φ = (L, R , f(L), g(R)) is close to (UFp, f(L), a) which belongs to D.

  • Type 2: φ = (L, R , f(L), g(R)) is close to UF2

p, which belongs to D.

  • Type 3: f(L) = AL

for some A ∈ Fn×n

p

, and ATg(R) = cR + d , for c ∈ Fp , and d ∈ Fn

p , which implies

φ = (L, R , cL, R + L, d) , which is in D if the partition S is large enough.

  • Type 4: Bad sets.

We show that the set Fn

p × Fn p can be partitioned into sets of the above four

types such that the total size of "bad" sets is much smaller than p2n.

slide-53
SLIDE 53

Main tools used for the proof

◮ Linearity test [BSG94, Sam07, San12] : For f : Fn

p → Fn p

Pr(f(L) − f(L′) = f(L − L′)) ≥ ε ⇒ ∃A Pr(f(L) = AL) ≥ p− log6(1/ε) .

◮ We need a generalized version, for which we show that

essentially the same proof works.

◮ Hadamard Extractor: ·, · is a strong 2-source extractor. ◮ (Generalized) Vazirani’s XOR Lemma:

(X1, X2) is close to uniform in Fp × Fp if and only if aX1 + bX2 is close to uniform in Fp for all a, b ∈ Fp , not both zero.

slide-54
SLIDE 54

F

2−split

Faff

NM

slide-55
SLIDE 55

Step two: Faffine ⇒ NM

c m Enc

A, B

h Ac + B Dec m*

2 2

slide-56
SLIDE 56

Step two: Faffine ⇒ NM

c m Enc

A, B

h Ac + B Dec m*

2 2

Define an affine-evasive set C of Fp as a set s.t. for C chosen uniformly at random from C, ∀ a, b ∈ Fp × Fp s.t. a = 0 and (a, b) = (1, 0)

slide-57
SLIDE 57

Step two: Faffine ⇒ NM

c m Enc

A, B

h Ac + B Dec m*

2 2

Define an affine-evasive set C of Fp as a set s.t. for C chosen uniformly at random from C, ∀ a, b ∈ Fp × Fp s.t. a = 0 and (a, b) = (1, 0) Pr(a · C + b ∈ C) ≈ 0 , Partition C into equal parts C1, . . . , C|M| and define Dec2(c) = m, if c ∈ Cm, and ⊥, otherwise .

slide-58
SLIDE 58

Step two: Faffine ⇒ NM

c m Enc

A, B

h Ac + B Dec m*

2 2

Define an affine-evasive set C of Fp as a set s.t. for C chosen uniformly at random from C, ∀ a, b ∈ Fp × Fp s.t. a = 0 and (a, b) = (1, 0) Pr(a · C + b ∈ C) ≈ 0 , Partition C into equal parts C1, . . . , C|M| and define Dec2(c) = m, if c ∈ Cm, and ⊥, otherwise . Thus, ∀m ∈ M, m∗ ≈ T(m) .

slide-59
SLIDE 59

Step two: Faffine ⇒ NM

c m Enc

A, B

h Ac + B Dec m*

2 2

Define an affine-evasive set C of Fp as a set s.t. for C chosen uniformly at random from C, ∀ a, b ∈ Fp × Fp s.t. a = 0 and (a, b) = (1, 0) Pr(a · C + b ∈ C) ≈ 0 , Partition C into equal parts C1, . . . , C|M| and define Dec2(c) = m, if c ∈ Cm, and ⊥, otherwise . Thus, ∀m ∈ M, m∗ ≈ T(m) . An affine-evasive set construction modulo p [A14]: S := 1 q (mod p)

  • q is prime , q < p1/4

2

  • .
slide-60
SLIDE 60

F

2−split

Faff

NM

slide-61
SLIDE 61

Our second result [ADKO15] NM-reduction from 2-split to t-split for large constant t

k-bit messages = ⇒ Θ(k)-bit codewords.

F

split

F2−la

NM

F

t−split

slide-62
SLIDE 62

Some natural tampering families

◮ St

n denotes the tampering family in the t-split-state model with

each part having length n.

slide-63
SLIDE 63

Some natural tampering families

◮ St

n denotes the tampering family in the t-split-state model with

each part having length n.

◮ L←t

n

denotes the class of lookahead manipulation functions l that can be rewritten as l = (l1, . . . , lt), for li : {0, 1}in → {0, 1}n, where l(x) = l1(x1)||l2(x1, x2)|| . . . ||li(x1, . . . , xi)|| . . . ||lt(x1, . . . , xt) .

slide-64
SLIDE 64

S2

3tn (⇒) L←t n Quentin: Q, S1 Wendy W S1

S1

− − − − − − − − − − →

R1

← − − − − − − − − − − R1 = Ext(W; S1) S2 = Ext(Q; R1)

S2

− − − − − − − − − − →

R2

← − − − − − − − − − − R2 = Ext(W; S2) . . . St = Ext(Q; Rt−1)

St

− − − − − − − − − − → Rt = Ext(W; St) Figure: Alternating Extraction

slide-65
SLIDE 65

S2

3tn (⇒) L←t n Quentin: Q, S1 Wendy W S1

S1

− − − − − − − − − − →

R1

← − − − − − − − − − − R1 = Ext(W; S1) S2 = Ext(Q; R1)

S2

− − − − − − − − − − →

R2

← − − − − − − − − − − R2 = Ext(W; S2) . . . St = Ext(Q; Rt−1)

St

− − − − − − − − − − → Rt = Ext(W; St) Figure: Alternating Extraction

◮ Dec((Q, S1), W) = S1, . . . , St. ◮ Alternating Extraction Theorem [DP07] shows:

Si+1, . . . , St ≈ U, given S1, . . . , Si, S′

1, . . . , S′ i .

◮ Intuitively, this implies

∀i, S′

i is independent of Si+1, . . . , St .

slide-66
SLIDE 66

S2

3tn (⇒) L←t n Quentin: Q, S1 Wendy W S1

S1

− − − − − − − − − − →

R1

← − − − − − − − − − − R1 = Ext(W; S1) S2 = Ext(Q; R1)

S2

− − − − − − − − − − →

R2

← − − − − − − − − − − R2 = Ext(W; S2) . . . St = Ext(Q; Rt−1)

St

− − − − − − − − − − → Rt = Ext(W; St) Figure: Alternating Extraction

slide-67
SLIDE 67

F

split

F2−la

NM

F

t−split

slide-68
SLIDE 68

L←t

2tℓ × L←t 2tℓ

⇒ St

ℓ Define the reduction by the following: Dec(L, R) := (Lt, R1, Lt−1, R2, . . . L1, Rt) , where ·, · is the ℓ-bit inner product (interpreting Li, Ri as elements of F2t

2n.

slide-69
SLIDE 69

L←t

2tℓ × L←t 2tℓ

⇒ St

ℓ Define the reduction by the following: Dec(L, R) := (Lt, R1, Lt−1, R2, . . . L1, Rt) , where ·, · is the ℓ-bit inner product (interpreting Li, Ri as elements of F2t

2n.

Intuitively, the result follows from the observation (using the Hadamard two-source extractor property) that bi = Lt−i+1, Ri is close to uniform given b′

j = L′ t−j+1, R′ j for j = i.

slide-70
SLIDE 70

L←t

2tℓ × L←t 2tℓ

⇒ St

ℓ Define the reduction by the following: Dec(L, R) := (Lt, R1, Lt−1, R2, . . . L1, Rt) , where ·, · is the ℓ-bit inner product (interpreting Li, Ri as elements of F2t

2n.

Intuitively, the result follows from the observation (using the Hadamard two-source extractor property) that bi = Lt−i+1, Ri is close to uniform given b′

j = L′ t−j+1, R′ j for j = i.

Formal proof: More subtle due to joint distributions. See paper.

slide-71
SLIDE 71

F

split

F2−la

NM

F

t−split

slide-72
SLIDE 72

Summarizing and Composing the two reductions

We showed:

◮ S2 3tn (⇒) L←t n ◮ L←t 2tℓ × L←t 2tℓ

⇒ St

slide-73
SLIDE 73

Summarizing and Composing the two reductions

We showed:

◮ S2 3tn (⇒) L←t n ◮ L←t 2tℓ × L←t 2tℓ

⇒ St

By composing, we get S4

6t2ℓ (⇒) St ℓ .

slide-74
SLIDE 74

Summarizing and Composing the two reductions

We showed:

◮ S2 3tn (⇒) L←t n ◮ L←t 2tℓ × L←t 2tℓ

⇒ St

By composing, we get S4

6t2ℓ (⇒) St ℓ .

This, however is not efficiently invertible. We can add a fifth part to make it efficiently invertible.

slide-75
SLIDE 75

Summarizing and Composing the two reductions

We showed:

◮ S2 3tn (⇒) L←t n ◮ L←t 2tℓ × L←t 2tℓ

⇒ St

By composing, we get S4

6t2ℓ (⇒) St ℓ .

This, however is not efficiently invertible. We can add a fifth part to make it efficiently invertible. Using another more involved construction, we can modify the first reduction to get the following efficiently invertible reduction.

◮ S2 O(t3n)

⇒ L←t

n ×L←t n

∪ . . . (only works for constant t) .

slide-76
SLIDE 76

Summarizing and Composing the two reductions

We showed:

◮ S2 3tn (⇒) L←t n ◮ L←t 2tℓ × L←t 2tℓ

⇒ St

By composing, we get S4

6t2ℓ (⇒) St ℓ .

This, however is not efficiently invertible. We can add a fifth part to make it efficiently invertible. Using another more involved construction, we can modify the first reduction to get the following efficiently invertible reduction.

◮ S2 O(t3n)

⇒ L←t

n ×L←t n

∪ . . . (only works for constant t) . This implies: S2

poly(t)·ℓ

⇒ St

ℓ .

slide-77
SLIDE 77

Concluding Non-malleability

Our work combined with an independent work [CZ14] gives constant rate 2-split NM-Codes.

slide-78
SLIDE 78

Concluding Non-malleability

Our work combined with an independent work [CZ14] gives constant rate 2-split NM-Codes. [CZ14] showed: S10

Θ(ℓ)

⇒ NMℓ.

slide-79
SLIDE 79

Concluding Non-malleability

Our work combined with an independent work [CZ14] gives constant rate 2-split NM-Codes. [CZ14] showed: S10

Θ(ℓ)

⇒ NMℓ. This combined with our reduction gives: S2

Θ(ℓ)

⇒ NMℓ .

F

split

F2−la

NM

F

[CG14b] [CZ14]

t−split

slide-80
SLIDE 80

Future work

The following are major open questions in this area.

◮ Optimizing the rate of the NM-code construction in split-state

model, either by improving our proof techniques, or using some

  • ther construction.

◮ Proposing other useful tampering models. ◮ Other applications of NM-codes. There has been some recent

work in this direction by [CMTV14] and [AGMPP14].

slide-81
SLIDE 81

Thank You