2019
DOI: 10.1049/iet-ifs.2018.5341
|View full text |Cite
|
Sign up to set email alerts
|

Multi‐key homomorphic authenticators

Abstract: Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m1,. .. , mt and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generate a short authenticator σ f,y vouching for the correctness of the output y of a function f computed on the outsourced data, i.e., y = f (m1,. .. , mt). Recently researchers have focused on HAs as a solution, with minimal communication and interaction, to the problem of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 41 publications
(204 reference statements)
0
24
0
Order By: Relevance
“…We remove the tools that are network-coding related and use a simple trick to obtain the multi-key features. While this technique is known and implicitly used in other works (e.g., [13,26]), here we make a clear explanation of it and show that a natural application of this technique already brings with a non-trivial construction. Performance-wise, mklhs only requires operations in the base curve for computing signatures or evaluating functions over authenticated data, while signature verification requires a product of pairings.…”
Section: Introductionmentioning
confidence: 70%
See 3 more Smart Citations
“…We remove the tools that are network-coding related and use a simple trick to obtain the multi-key features. While this technique is known and implicitly used in other works (e.g., [13,26]), here we make a clear explanation of it and show that a natural application of this technique already brings with a non-trivial construction. Performance-wise, mklhs only requires operations in the base curve for computing signatures or evaluating functions over authenticated data, while signature verification requires a product of pairings.…”
Section: Introductionmentioning
confidence: 70%
“…In other words, the "combined" signature can be used to verify that what the cloud outputs to the verifier is indeed the answer to the desired computation on the database (and not some random authenticated record). Existing MKHS constructions are based on lattice techniques [13], zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) [23], or creative yet convoluted compilers [14,26]. In this work, we take multi-key homomorphic signatures as a case of study and propose a new scheme that we consider conceptually simpler than all existing proposals.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, current MIFE schemes have prohibitively large overhead. Fiore et al [20] built a multikey homomorphic authenticator (multikey HA), allowing multiple clients to authenticate and outsource a large collection of data, together with the corresponding authenticators, to a malicious server. Backes et al [12] added a crucial efficiency property for the verification of multikey HAs.…”
Section: Related Workmentioning
confidence: 99%