We construct uniquely decodable codes against channels which are computationally bounded. Our construction requires only a public-coin (transparent) setup. All prior work for such channels either required a setup with secret keys and states, could not achieve unique decoding, or got worse rates (for a given bound on codeword corruptions). On the other hand, our construction relies on a strong cryptographic hash function with security properties that we only instantiate in the random oracle model
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), encode messages s in ...
We consider the problem of protecting general computations against constant-rate random leakage. Tha...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
In this paper, we consider coding schemes for computationally bounded channels, which can introduce ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
We study variants of locally decodable and locally correctable codes in computationally bounded, adv...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
We study the question of minimizing the computational complexity of (robust) secret sharing schemes ...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
When communicating over a noisy channel, it is typically much easier to deal with random, independen...
We consider the problem of constructing efficient locally decodable codes in the presence of a compu...
Non-malleable codes are a natural relaxation of error correction and error detection codes applicabl...
We prove that if a linear error-correcting code C: {0, 1}^n → {0, 1}^m is such that a bit of the mes...
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), encode messages s in ...
We consider the problem of protecting general computations against constant-rate random leakage. Tha...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
In this paper, we consider coding schemes for computationally bounded channels, which can introduce ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
We study variants of locally decodable and locally correctable codes in computationally bounded, adv...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
We study the question of minimizing the computational complexity of (robust) secret sharing schemes ...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
When communicating over a noisy channel, it is typically much easier to deal with random, independen...
We consider the problem of constructing efficient locally decodable codes in the presence of a compu...
Non-malleable codes are a natural relaxation of error correction and error detection codes applicabl...
We prove that if a linear error-correcting code C: {0, 1}^n → {0, 1}^m is such that a bit of the mes...
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), encode messages s in ...
We consider the problem of protecting general computations against constant-rate random leakage. Tha...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...