2014
DOI: 10.1007/978-3-642-54631-0_31
|View full text |Cite
|
Sign up to set email alerts
|

Generalizing Homomorphic MACs for Arithmetic Circuits

Abstract: Abstract. Homomorphic MACs, introduced by Gennaro and Wichs in 2013, allow anyone to validate computations on authenticated data without knowledge of the secret key. Moreover, the secret-key owner can verify the validity of the computation without needing to know the original (authenticated) inputs. Beyond security, homomorphic MACs are required to produce short tags (succinctness) and to support composability (i.e., outputs of authenticated computations should be re-usable as inputs for new computations).At E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
18
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 39 publications
1
18
0
Order By: Relevance
“…This result has been proven for homomorphic MACs in [11]. Here we extend it to homomorphic signatures.…”
Section: Proposition 1 ([11]supporting
confidence: 56%
See 1 more Smart Citation
“…This result has been proven for homomorphic MACs in [11]. Here we extend it to homomorphic signatures.…”
Section: Proposition 1 ([11]supporting
confidence: 56%
“…Below, we show two simple propositions that allow to overcome this issue for the case of homomorphic signatures whose class of supported functions are arithmetic circuits of degree d, over a finite field of order p such that d/p < 1/2. The first proposition is taken from [11] and provides a way to probabilistically test whether a program is well-defined.…”
Section: Homomorphic Signatures For Multi-labeled Programsmentioning
confidence: 99%
“…The proof is an adaptation to the multi-key setting of Proposition 2 in [12]. For completeness we give the proof.…”
Section: Definition 8 (Weak Forgery)mentioning
confidence: 99%
“…12 The algorithm then runs σ ←Sign (sk ∆ id , , m), and uses the non-homomorphic scheme to sign the concatenation of the public key vk ∆ id and the dataset identifier ∆, i.e., σ ∆ id ← NH.Sign(sk…”
Section: From a Single Dataset To Multiple Datasetsmentioning
confidence: 99%
“…However, the security of the scheme only holds in a setting without verification queries and can completely break down if the attacker has access to a verification oracle allowing him to test whether authentication tags are valid. More recent works [CF13,BFR13,CFGN14] show how to get homomorphic MACs that remain secure in the presence of verification queries, but only for restricted homomorphisms. Currently, the best such schemes allow for the evaluation of polynomials of degree k, where the computational effort grows polynomially with k (but the size of the evaluated authentication tag stays fixed).…”
Section: Related Workmentioning
confidence: 99%