Constant rate Non malleable Codes and their Applications
| dc.contributor.guide | Kanukurthi, Bhavana | |
| dc.coverage.spatial | ||
| dc.creator.researcher | Obbattu, Sai Lakshmi Bhavana | |
| dc.date.accessioned | 2022-12-19T11:24:18Z | |
| dc.date.available | 2022-12-19T11:24:18Z | |
| dc.date.awarded | 2020 | |
| dc.date.completed | 2020 | |
| dc.date.registered | ||
| dc.description.abstract | newline Non-malleable codes(NMC) introduced by Dziembowski, Pietrzak and Wichs in ITCS 2010, provide powerful security guarantees where error-correcting codes can not provide any guarantee: a decoding of tampered codeword is either the same or completely independent of the underlying message. One of the most important families of tampering functions is the t-splitstate family, where, the adversary tampers each of the t blocks (called state) of a codeword, independently. In this thesis, we construct the first explicit constant-rate and constant-state non-malleable code. In particular, we construct an efficient non-malleable code in the t-splitstate model, for t = 4, that achieves a constant rate of 1 3+and#950; , for any constant and#950; gt 0 and error 2 and#8722;and#8486;(`/logc+1`) , where ` is the length of the message and c gt 0 is an arbitrary constant. We then focus on the fascinating problem of privacy amplification introduced by Bennett et.al in 1988. A privacy amplification(PA) protocol allows two parties, Alice and Bob, who a-priori share a weak secret w, to agree on a uniform secret key, in the presence of a computationally unbounded adversary Eve. Specifically, we show how to construct a constant round privacy amplification protocol from any augmented split-state non-malleable code. Existentially, this gives us another primitive (in addition to optimal non-malleable extractors) whose optimal construction would result in a privacy amplification protocol with optimal entropy loss and min-entropy requirement. Instantiating our code with the NMC due to Li (STOC 2017), gives us an 8-round privacy amplification protocol with entropy loss O(log(n) +and#954; log(and#954;)) and min-entropy requirement and#8486;(log(n) + and#954; log(and#954;)), where and#954; is the security parameter and n is the length of the shared weak secret. In fact, for our result, even the weaker primitive of Non-malleable Randomness Encoders suffice. We view this result as an exciting connection between two of the most fascinating and well-studied information theoretic primitives, non-malleable code... | |
| dc.description.note | ||
| dc.format.accompanyingmaterial | DVD | |
| dc.format.dimensions | 30 cm. | |
| dc.format.extent | vi, 85 p. | |
| dc.identifier.uri | http://hdl.handle.net/10603/428413 | |
| dc.language | English | |
| dc.publisher.institution | Computer Science and Automation | |
| dc.publisher.place | Bangalore | |
| dc.publisher.university | Indian Institute of Science Bangalore | |
| dc.relation | ||
| dc.rights | university | |
| dc.source.university | University | |
| dc.subject.keyword | Computer Science | |
| dc.subject.keyword | Computer Science Software Engineering | |
| dc.subject.keyword | Engineering and Technology | |
| dc.title | Constant rate Non malleable Codes and their Applications | |
| dc.title.alternative | Constant-rate Non-malleable Codes and their Applications | |
| dc.type.degree | Ph.D. |
Files
Original bundle
1 - 5 of 10
Loading...
- Name:
- 01_title.pdf
- Size:
- 70 KB
- Format:
- Adobe Portable Document Format
- Description:
- Attached File
Loading...
- Name:
- 02_prelim pages.pdf
- Size:
- 215.93 KB
- Format:
- Adobe Portable Document Format
Loading...
- Name:
- 03_table of content.pdf
- Size:
- 66.95 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1