Proofs of work from worst-case assumptions

M Ball, A Rosen, M Sabin, PN Vasudevan - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
Abstract We give Proofs of Work (PoWs) whose hardness is based on well-studied worst-
case assumptions from fine-grained complexity theory. This extends the work of (Ball et al …

Revisiting non-malleable secret sharing

S Badrinarayanan, A Srinivasan - … on the Theory and Applications of …, 2019 - Springer
A threshold secret sharing scheme (with threshold t) allows a dealer to share a secret
among a set of parties such that any group of t or more parties can recover the secret and no …

Non-malleable codes with optimal rate for poly-size circuits

M Ball, R Shaltiel, J Silbak - … International Conference on the Theory and …, 2024 - Springer
We give an explicit construction of non-malleable codes with rate 1-o (1) for the tampering
class of poly-size circuits. This rate is optimal, and improves upon the previous explicit …

Non-malleable codes for small-depth circuits

M Ball, D Dachman-Soled, S Guo… - 2018 IEEE 59th …, 2018 - ieeexplore.ieee.org
We construct efficient, unconditional non-malleable codes that are secure against tampering
functions computed by small-depth circuits. For constant-depth circuits of polynomial size (ie …

Four-state non-malleable codes with explicit constant rate

B Kanukurthi, SLB Obbattu, S Sekar - Journal of Cryptology, 2020 - Springer
Abstract Non-malleable codes (NMCs), introduced by Dziembowski, Pietrzak and Wichs
(ITCS 2010), provide a powerful guarantee in scenarios where the classical notion of error …

A constant rate non-malleable code in the split-state model

D Aggarwal, M Obremski - 2020 IEEE 61st Annual Symposium …, 2020 - ieeexplore.ieee.org
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs in ICS 2010, have
emerged in the last few years as a fundamental object at the intersection of cryptography …

Non-malleable encryption: simpler, shorter, stronger

S Coretti, Y Dodis, U Maurer, B Tackmann… - Journal of …, 2020 - Springer
One approach toward basing public-key encryption (PKE) schemes on weak and credible
assumptions is to build “stronger” or more general schemes generically from “weaker” or …

Non-malleable codes for bounded parallel-time tampering

D Dachman-Soled, I Komargodski, R Pass - Annual International …, 2021 - Springer
Non-malleable codes allow one to encode data in such a way that once a codeword is being
tampered with, the modified codeword is either an encoding of the original message, or a …

Rate one-third non-malleable codes

D Aggarwal, B Kanukurthi, SLB Obbattu… - Proceedings of the 54th …, 2022 - dl.acm.org
At ITCS 2010, Dziembowski, Pietrzak, and Wichs introduced Non-malleable Codes (NMCs)
which protect against tampering of a codeword of a given message into the codeword of a …

Non-malleable codes against bounded polynomial time tampering

M Ball, D Dachman-Soled, M Kulkarni, H Lin… - Advances in Cryptology …, 2019 - Springer
We construct efficient non-malleable codes (NMC) that are (computationally) secure against
tampering by functions computable in any fixed polynomial time. Our construction is in the …