2014
DOI: 10.1007/978-3-662-44371-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Signatures with Efficient Verification for Polynomial Functions

Abstract: Abstract. A homomorphic signature scheme for a class of functions C allows a client to sign and upload elements of some data set D on a server. At any later point, the server can derive a (publicly verifiable) signature that certifies that some y is the result computing some f ∈ C on the basic data set D. This primitive has been formalized by Boneh and Freeman (Eurocrypt 2011) who also proposed the only known construction for the class of multivariate polynomials of fixed degree d ≥ 1. In this paper we constru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 90 publications
(63 citation statements)
references
References 28 publications
0
63
0
Order By: Relevance
“…In compliance with previous work [7,10] on homomorphic signatures, we formalize aggregate unforgeability via a game in which Aggregator A accesses oracles O Setup and O EncTag . Furthermore, given the property that anyone holding the public verification key VK can execute the algorithm Verify, we assume that Aggregator A during the unforgeability game runs the algorithm Verify by itself.…”
Section: Security Modelmentioning
confidence: 98%
“…In compliance with previous work [7,10] on homomorphic signatures, we formalize aggregate unforgeability via a game in which Aggregator A accesses oracles O Setup and O EncTag . Furthermore, given the property that anyone holding the public verification key VK can execute the algorithm Verify, we assume that Aggregator A during the unforgeability game runs the algorithm Verify by itself.…”
Section: Security Modelmentioning
confidence: 98%
“…The construction is based on the hardness of the Small Integer Solution (SIS) problem in ideal lattices and has a proof of security in the random-oracle model. The recent work of Catalano et al [CFW14] gives an alternate solution using multi-linear maps which removes the need for random oracles at the cost of having large public parameters. The main open question left by these works is to construct signatures with greater levels of homomorphism, and ideally a fully homomorphic scheme that can evaluate arbitrary circuits.…”
Section: Related Workmentioning
confidence: 99%
“…However, there is a way to generate A along with a trapdoor td that makes this easy and, more generally, for any matrix V ∈ Z n×m q , 2 Although Catalano et al [CFW14] provide a similar transformation, it works only for bounded degree polynomial functions, and does not generalize to leveled FHS. the trapdoor can be used to sample a "short" matrix U ∈ Z m×m q such that AU = V. There is also a public matrix G ∈ Z n×m q with some special structure (not random) for which everyone can efficiently compute a "short" matrix G −1 (V) such that GG −1 (V) = V. 3 Our HTDF consists of choosing pk = A together with trapdoor sk = td as above.…”
Section: Homomorphic Trapdoor Functions (Htdf)mentioning
confidence: 99%
“…Their solution is based on multi-linear maps and bypasses the need for random oracles. More interestingly, the work by Catalano et al [16] contains the first mechanism to verify signatures faster than the running time of the verified function. Recently, Gorbunov et al [29] have proposed the first (leveled) fully homomorphic signature scheme that can evaluate arbitrary circuits of bounded 5 Note that s can be bounded by poly(n) for constant d, or by poly(d) for constant n.…”
Section: Related Workmentioning
confidence: 99%
“…The intuition behind this transformation is similar to the one employed in [29] and implicitly used in [16,13], except that here we have to use additional techniques to deal with the multi-key setting. We combine a standard signature scheme NH.Sig (non-homomorphic) with a single dataset multi-key homomorphic signature scheme MKHSig .…”
Section: From a Single Dataset To Multiple Datasetsmentioning
confidence: 99%