Authorized function homomorphic signature
Homomorphic signature (HS) is a novel primitive that allows an agency to carry out arbitrary (polynomial time) computation f on the signed data (m) over right arrow and accordingly gain a signature sigma(h) for the computation result f ((m) over right arrow) with respect to f on behalf of the data o...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7325 https://ink.library.smu.edu.sg/context/sis_research/article/8328/viewcontent/Authorized_Function_Homomorphic_Signature.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8328 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83282022-11-02T01:34:54Z Authorized function homomorphic signature GUO, Qingwen HUANG, Qiong YANG, Guomin Homomorphic signature (HS) is a novel primitive that allows an agency to carry out arbitrary (polynomial time) computation f on the signed data (m) over right arrow and accordingly gain a signature sigma(h) for the computation result f ((m) over right arrow) with respect to f on behalf of the data owner (DO). However, since DO lacks control of the agency's behavior, receivers would believe that DO did authenticate the computation result even if the agency misbehaves and applies a function that the DO does not want. To address the problem above, in this paper we introduce a new primitive called authorized function homomorphic signature (AFHS). In AFHS, the agency has to obtain a confidence key sk(f) from DO in order to evaluate a function f on the data (m) over right arrow and to obtain a signature with which one can check whether the agency acts in accordance with DO's instructions. A black-box construction of AFHS based on HS is given in this paper, and we show that if the underlying primitives are secure, so is our construction under the given security model. Moreover, we provide a somewhat concrete construction that offers stronger security guarantee. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7325 info:doi/10.1093/comjnl/bxy114 https://ink.library.smu.edu.sg/context/sis_research/article/8328/viewcontent/Authorized_Function_Homomorphic_Signature.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University digital signature homomorphic signature functional signature zk-SNARKs cloud computing Information Security OS and Networks |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
digital signature homomorphic signature functional signature zk-SNARKs cloud computing Information Security OS and Networks |
spellingShingle |
digital signature homomorphic signature functional signature zk-SNARKs cloud computing Information Security OS and Networks GUO, Qingwen HUANG, Qiong YANG, Guomin Authorized function homomorphic signature |
description |
Homomorphic signature (HS) is a novel primitive that allows an agency to carry out arbitrary (polynomial time) computation f on the signed data (m) over right arrow and accordingly gain a signature sigma(h) for the computation result f ((m) over right arrow) with respect to f on behalf of the data owner (DO). However, since DO lacks control of the agency's behavior, receivers would believe that DO did authenticate the computation result even if the agency misbehaves and applies a function that the DO does not want. To address the problem above, in this paper we introduce a new primitive called authorized function homomorphic signature (AFHS). In AFHS, the agency has to obtain a confidence key sk(f) from DO in order to evaluate a function f on the data (m) over right arrow and to obtain a signature with which one can check whether the agency acts in accordance with DO's instructions. A black-box construction of AFHS based on HS is given in this paper, and we show that if the underlying primitives are secure, so is our construction under the given security model. Moreover, we provide a somewhat concrete construction that offers stronger security guarantee. |
format |
text |
author |
GUO, Qingwen HUANG, Qiong YANG, Guomin |
author_facet |
GUO, Qingwen HUANG, Qiong YANG, Guomin |
author_sort |
GUO, Qingwen |
title |
Authorized function homomorphic signature |
title_short |
Authorized function homomorphic signature |
title_full |
Authorized function homomorphic signature |
title_fullStr |
Authorized function homomorphic signature |
title_full_unstemmed |
Authorized function homomorphic signature |
title_sort |
authorized function homomorphic signature |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/7325 https://ink.library.smu.edu.sg/context/sis_research/article/8328/viewcontent/Authorized_Function_Homomorphic_Signature.pdf |
_version_ |
1770576312235196416 |