2017
DOI: 10.1007/978-3-319-55589-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Furthermore, although the two instantiations of LAEPuV [19,20] are very efficient (since the homomorphic operation on the encrypted message in LAEPuV is a linear function), their security is proved in the random oracle model. On the contrary, the security of our proposed signcryption primitive is proved in the standard model and can be employed for a more general function, that is, for any polynomial size circuit, which leads to sacrificing some efficiency.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Furthermore, although the two instantiations of LAEPuV [19,20] are very efficient (since the homomorphic operation on the encrypted message in LAEPuV is a linear function), their security is proved in the random oracle model. On the contrary, the security of our proposed signcryption primitive is proved in the standard model and can be employed for a more general function, that is, for any polynomial size circuit, which leads to sacrificing some efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…The main difference between our homomorphic signcryption and LAEPuV relies on the verification algorithm. More precisely, in LAEPuV [19,20] the verification algorithm is defined as Verifyðvk; id; c; f Þ and requires that the condition Verifyðvk; id; c; f Þ ¼ 1 is equivalent to ∃m; s:t: Decrypt ðsk; id; c; f Þ ¼ m. Such a correctness requirement implies that if the verification is successful, the verifier is convinced that c is an encryption of some message, but without knowing to which message c corresponds to. In contrast, the verification algorithm in our homomorphic signcryption is defined as Verifyðpk; tag; m 0 ; c 0 ; f Þ, which is employed to check the matching of a message m 0 with the corresponding signcryption c 0 .…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations