Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Maciej Obremski is active.

Publication


Featured researches published by Maciej Obremski.


international cryptology conference | 2013

Non-malleable Codes from Two-Source Extractors

Stefan Dziembowski; Tomasz Kazana; Maciej Obremski

We construct an efficient information-theoretically non-malleable code in the split-state model for one-bit messages. Non-malleable codes were introduced recently by Dziembowski, Pietrzak and Wichs (ICS 2010), as a general tool for storing messages securely on hardware that can be subject to tampering attacks. Informally, a code \((\mathsf{Enc} : {\cal M} \rightarrow {\cal L} \times {\cal R}, \mathsf{Dec} : {\cal L} \times {\cal R} \rightarrow {\cal M})\) is non-malleable in the split-state model if any adversary, by manipulating independently L and R (where (L,R) is an encoding of some message M), cannot obtain an encoding of a message M′ that is not equal to M but is “related” M in some way. Until now it was unknown how to construct an information-theoretically secure code with such a property, even for \({\cal M} = \{0,1\}\). Our construction solves this problem. Additionally, it is leakage-resilient, and the amount of leakage that we can tolerate can be an arbitrary fraction ξ < 1/4 of the length of the codeword. Our code is based on the inner-product two-source extractor, but in general it can be instantiated by any two-source extractor that has large output and has the property of being flexible, which is a new notion that we define.


theory of cryptography conference | 2015

Leakage-Resilient Non-malleable Codes

Divesh Aggarwal; Stefan Dziembowski; Tomasz Kazana; Maciej Obremski

A recent trend in cryptography is to construct cryptosystems that are secure against physical attacks. Such attacks are usually divided into two classes: the leakage attacks in which the adversary obtains some information about the internal state of the machine, and the tampering attacks where the adversary can modify this state. One of the popular tools used to provide tamper-resistance are the non-malleable codes introduced by Dziembowski, Pietrzak and Wichs (ICS 2010). These codes can be defined in several variants, but arguably the most natural of them are the information-theoretically secure codes in the k-split-state model (the most desired case being k = 2).


symposium on the theory of computing | 2015

Non-malleable Reductions and Applications

Divesh Aggarwal; Yevgeniy Dodis; Tomasz Kazana; Maciej Obremski


IACR Cryptology ePrint Archive | 2014

Non-malleable Reductions and Applications.

Divesh Aggarwal; Yevgeniy Dodis; Tomasz Kazana; Maciej Obremski


Electronic Colloquium on Computational Complexity | 2017

Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model.

Nico Döttling; Jesper Buus Nielsen; Maciej Obremski


IACR Cryptology ePrint Archive | 2015

Inception Makes Non-malleable Codes Stronger.

Divesh Aggarwal; Tomasz Kazana; Maciej Obremski


IACR Cryptology ePrint Archive | 2018

Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.

Ivan Damgård; Tomasz Kazana; Maciej Obremski; Varun Raj; Luisa Siniscalchi


IACR Cryptology ePrint Archive | 2017

Inverted Leftover Hash Lemma.

Maciej Obremski; Maciej Skorski


IACR Cryptology ePrint Archive | 2017

Renyi Entropy Estimation Revisited.

Maciej Obremski; Maciej Skorski


theory of cryptography conference | 2015

Leakage-Resilient Non-malleable Codes Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I

Divesh Aggarwal; Stefan Dziembowski; Maciej Obremski; Tomasz Kazana

Collaboration


Dive into the Maciej Obremski's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Divesh Aggarwal

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nico Döttling

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge