Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2018
Non-malleable secret sharing
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 685–698https://doi.org/10.1145/3188745.3188872A number of works have focused on the setting where an adversary tampers with the shares of a secret sharing scheme. This includes literature on verifiable secret sharing, algebraic manipulation detection(AMD) codes, and, error correcting or detecting ...
- research-articleJune 2017
Non-malleable codes and extractors for small-depth circuits, and affine functions
STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of ComputingPages 1171–1184https://doi.org/10.1145/3055399.3055483Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs as an elegant relaxation of error correcting codes, where the motivation is to handle more general forms of tampering while still providing meaningful guarantees. This has led to ...
- research-articleJune 2016
Non-malleable extractors and codes, with their many tampered extensions
STOC '16: Proceedings of the forty-eighth annual ACM symposium on Theory of ComputingPages 285–298https://doi.org/10.1145/2897518.2897547Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are seeded non-...