Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be viewed as keyless combinatorial authentication codes that provide security in the presence of an oblivious, algebraic attacker. Its original applications included robust fuzzy extractors, secure messag...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2016
|
Online Access: | https://hdl.handle.net/10356/81331 http://hdl.handle.net/10220/40375 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-81331 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-813312023-02-28T19:30:35Z Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model Padró, Carles Xing, Chaoping Cramer, Ronald Dodis, Yevgeniy Nielsen, Jesper Buus School of Physical and Mathematical Sciences Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be viewed as keyless combinatorial authentication codes that provide security in the presence of an oblivious, algebraic attacker. Its original applications included robust fuzzy extractors, secure message transmission and robust secret sharing. In recent years, however, a rather diverse array of additional applications in cryptography has emerged. In this paper we consider, for the first time, the regime of arbitrary positive constant error probability ϵ in combination with unbounded cardinality M of the message space. There are several applications where this model makes sense. Adapting a known bound to this regime, it follows that the binary length ρ of the tag satisfies ρ ≥ log log M + Ωϵ(1). In this paper, we shall call AMD codes meeting this lower bound optimal. Known constructions, notably a construction based on dedicated polynomial evaluation codes, are a multiplicative factor 2 off from being optimal. By a generic enhancement using error-correcting codes, these parameters can be further improved but remain suboptimal. Reaching optimality efficiently turns out to be surprisingly nontrivial. Owing to our refinement of the mathematical perspective on AMD codes, which focuses on symmetries of codes, we propose novel constructive principles. This leads to an explicit construction based on certain BCH codes that improves the parameters of the polynomial construction and to an efficient randomized construction of optimal AMD codes based on certain quasi-cyclic codes. In all our results, the error probability ϵ can be chosen as an arbitrarily small positive real number. Accepted version 2016-04-07T08:14:37Z 2019-12-06T14:28:36Z 2016-04-07T08:14:37Z 2019-12-06T14:28:36Z 2015 Journal Article Cramer, R., Padró, C., Xing, C. (2015). Optimal algebraic manipulation detection codes in the constant-error model. Dodis, Y., & Nielsen, J. B. (eds), Lecture Notes in Computer Science, 9014, 481-501. 0302-9743 https://hdl.handle.net/10356/81331 http://hdl.handle.net/10220/40375 10.1007/978-3-662-46494-6_20 en Lecture Notes in Computer Science © 2015 International Association for Cryptologic Research. This is the author created version of a work that has been peer reviewed and accepted for publication in Lecture Notes in Computer Science, published by Springer Berlin Heidelberg on behalf of International Association for Cryptologic Research. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [10.1007/978-3-662-46494-6_20]. 21 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
description |
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be viewed as keyless combinatorial authentication codes that provide security in the presence of an oblivious, algebraic attacker. Its original applications included robust fuzzy extractors, secure message transmission and robust secret sharing. In recent years, however, a rather diverse array of additional applications in cryptography has emerged. In this paper we consider, for the first time, the regime of arbitrary positive constant error probability ϵ in combination with unbounded cardinality M of the message space. There are several applications where this model makes sense. Adapting a known bound to this regime, it follows that the binary length ρ of the tag satisfies ρ ≥ log log M + Ωϵ(1). In this paper, we shall call AMD codes meeting this lower bound optimal. Known constructions, notably a construction based on dedicated polynomial evaluation codes, are a multiplicative factor 2 off from being optimal. By a generic enhancement using error-correcting codes, these parameters can be further improved but remain suboptimal. Reaching optimality efficiently turns out to be surprisingly nontrivial. Owing to our refinement of the mathematical perspective on AMD codes, which focuses on symmetries of codes, we propose novel constructive principles. This leads to an explicit construction based on certain BCH codes that improves the parameters of the polynomial construction and to an efficient randomized construction of optimal AMD codes based on certain quasi-cyclic codes. In all our results, the error probability ϵ can be chosen as an arbitrarily small positive real number. |
author2 |
Dodis, Yevgeniy |
author_facet |
Dodis, Yevgeniy Padró, Carles Xing, Chaoping Cramer, Ronald |
format |
Article |
author |
Padró, Carles Xing, Chaoping Cramer, Ronald |
spellingShingle |
Padró, Carles Xing, Chaoping Cramer, Ronald Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model |
author_sort |
Padró, Carles |
title |
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model |
title_short |
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model |
title_full |
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model |
title_fullStr |
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model |
title_full_unstemmed |
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model |
title_sort |
optimal algebraic manipulation detection codes in the constant-error model |
publishDate |
2016 |
url |
https://hdl.handle.net/10356/81331 http://hdl.handle.net/10220/40375 |
_version_ |
1759855779389636608 |