Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2600694.2600697acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Generalized homomorphic MACs with efficient verification

Published: 03 June 2014 Publication History

Abstract

Homomorphic MACs allow the holder of a secret key to construct authenticators for data blocks such that an untrusted server that computes a function of the data, can also compute an authenticator that can be verified by the key holder, guaranteeing correctness of the computation. Homomorphic MACs that allow verifiable computation of multivariate polynomials of degree ≤ 2 have been proposed by Backes, Fiore and Reischuk (CCS 2013). We generalize their construction such that polynomials of degree l>2 can also be computed. Our generalization uses multilinear map abstraction and has security based on the l-linear assumption.

References

[1]
S. Agrawal and D. Boneh. Homomorphic MACs: MAC-based integrity for network coding. In ACNS, 2009.
[2]
N. Attrapadung and B. Libert. Homomorphic network coding signatures in the standard model. In PKC, 2011.
[3]
N. Attrapadung, B. Libert, and T. Peters. Computing on authenticated data: New privacy definitions and constructions. In ASIACRYPT, 2012.
[4]
N. Attrapadung, B. Libert, and T. Peters. Efficient completely context-hiding quotable and linearly homomorphic signatures. In PKC, 2013.
[5]
M. Backes, D. Fiore, and R. M. Reischuk. Verifiable delegation of computation on outsourced data. In CCS, 2013.
[6]
S. Benabbas, R. Gennaro, and Y. Vahlis. Verifiable delegation of computation over large datasets. In CRYPTO, 2011.
[7]
N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In ITCS, 2012.
[8]
D. Boneh and D. M. Freeman. Homomorphic signatures for polynomial functions. In EUROCRYPT, 2011.
[9]
D. Boneh and D. M. Freeman. Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In PKC, 2011.
[10]
D. Boneh, D. M. Freeman, J. Katz, and B. Waters. Signing a linear subspace: Signature schemes for network coding. In PKC, 2009.
[11]
D. Boneh, K. Lewi, H. W. Montgomery, and A. Raghunathan. Key homomorphic PRFs and their applications. In CRYPTO, 2013.
[12]
D. Boneh and A. Silverberg. Applications of multilinear forms to cryptography. IACR Cryptology ePrint Archive Report, 2002:80, 2002.
[13]
D. Catalano and D. Fiore. Practical homomorphic MACs for arithmetic circuits. In EUROCRYPT, 2013.
[14]
D. Catalano, D. Fiore, R. Gennaro, L. Nizzardo. Generalizing homomorphic MACs for arithmetic circuits. In PKC, 2014.
[15]
D. Catalano, D. Fiore, and B. Warinschi. Adaptive pseudo-free groups and applications. In EUROCRYPT, 2011.
[16]
D. Catalano, D. Fiore, and B. Warinschi. Efficient network coding signatures in the standard model. In PKC, 2012.
[17]
K. M. Chung, Y. T. Kalai, F. H. Liu, and R. Raz. Memory delegation. In CRYPTO, 2011.
[18]
J. S. Coron, T. Lepoint, and M. Tibouchi. Practical multilinear maps over the integers. In CRYPTO, 2013.
[19]
S. Garg, C. Gentry, and S. Halevi. Candidate multilinear maps from ideal lattices. In EUROCRYPT, 2013.
[20]
S. Garg, C. Gentry, S. Halevi, A. Sahai, and B. Waters. Attribute-based encryption for circuits from multilinear maps. In CRYPTO, 2013.
[21]
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
[22]
R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin. Secure network coding over the integers. In PKC, 2010.
[23]
R. Gennaro and D. Wichs. Fully homomorphic message authenticators. In ASIACRYPT, 2013.
[24]
C. Gentry and D. Wichs. Separating succinct non-interactive arguments from all falsifiable assumptions. In STOC, 2011.
[25]
M. T. Goodrich, R. Tamassia, and J. Hasic. An efficient dynamic and distributed cryptographic accumulator. In ISC, 2002.
[26]
R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. In CT-RSA, 2002.
[27]
A. B. Lewko and B. Waters. Efficient pseudorandom functions from the decisional linear assumption and weaker variants. In CCS, 2009.
[28]
M. Naor and K. Nissim. Certificate revocation and certificate update. IEEE Journal on Selected Areas in Communications, 18(4):561--570, 2000.
[29]
C. Papamanthou, E. Shi, and R. Tamassia. Signatures of correct computation. In TCC, 2013.
[30]
C. Papamanthou, R. Tamassia, and N. Triandopoulos. Optimal authenticated data structures with multilinear forms. In Pairing, 2010.
[31]
C. Papamanthou, R. Tamassia, and N. Triandopoulos. Optimal verification of operations on dynamic sets. In CRYPTO, 2011.
[32]
B. Parno, M. Raykova, and V. Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In TCC, 2012.

Cited By

View all
  • (2023)An Efficient Method for Realizing Contractions of Access Structures in Cloud StorageIEEE Transactions on Services Computing10.1109/TSC.2023.332589416:6(4481-4492)Online publication date: Nov-2023
  • (2022)Fair Outsourcing Polynomial Computation Based on the BlockchainIEEE Transactions on Services Computing10.1109/TSC.2021.305477215:5(2795-2808)Online publication date: 1-Sep-2022
  • (2019)Function-Dependent Commitments from Homomorphic AuthenticatorsInformation Security and Privacy10.1007/978-3-030-21548-4_22(399-418)Online publication date: 30-May-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIAPKC '14: Proceedings of the 2nd ACM workshop on ASIA public-key cryptography
June 2014
66 pages
ISBN:9781450328012
DOI:10.1145/2600694
  • Program Chairs:
  • Keita Emura,
  • Goichiro Hanaoka,
  • Yunlei Zhao
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. PRFs with closed-form efficiency
  2. delegation of computation
  3. homomorphic MACs
  4. multilinear maps

Qualifiers

  • Research-article

Conference

ASIA CCS '14
Sponsor:

Acceptance Rates

ASIAPKC '14 Paper Acceptance Rate 6 of 22 submissions, 27%;
Overall Acceptance Rate 36 of 103 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)An Efficient Method for Realizing Contractions of Access Structures in Cloud StorageIEEE Transactions on Services Computing10.1109/TSC.2023.332589416:6(4481-4492)Online publication date: Nov-2023
  • (2022)Fair Outsourcing Polynomial Computation Based on the BlockchainIEEE Transactions on Services Computing10.1109/TSC.2021.305477215:5(2795-2808)Online publication date: 1-Sep-2022
  • (2019)Function-Dependent Commitments from Homomorphic AuthenticatorsInformation Security and Privacy10.1007/978-3-030-21548-4_22(399-418)Online publication date: 30-May-2019
  • (2018)Function-Dependent Commitments for Verifiable Multi-party ComputationDevelopments in Language Theory10.1007/978-3-319-99136-8_16(289-307)Online publication date: 15-Aug-2018
  • (2017)Analysis of the State of the ArtPrivately and Publicly Verifiable Computing Techniques10.1007/978-3-319-53798-6_8(49-56)Online publication date: 29-Mar-2017
  • (2017)Homomorphic AuthenticatorsPrivately and Publicly Verifiable Computing Techniques10.1007/978-3-319-53798-6_5(27-35)Online publication date: 29-Mar-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media