Multi-key homomorphic authenticators

被引:12
作者
Fiore, Dario [1 ]
Mitrokotsa, Aikaterini [2 ]
Nizzardo, Luca [1 ,3 ]
Pagnin, Elena [2 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] Chalmers Univ Technol, Gothenburg, Sweden
[3] Univ Politecn Madrid, Madrid, Spain
关键词
polynomials; cryptography; outsourcing; message authentication; multikey homomorphic signature; multikey homomorphic message authentication codes; multikey homomorphic authenticators; untrusted server; outsourced data; minimal communication; single user; multikey HAs; public evaluation keys; secret keys; short authenticator; bounded polynomial depth; COMPUTATION; DELEGATION; LATTICES;
D O I
10.1049/iet-ifs.2018.5341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m1,., mt and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generate a short authenticator sf, y vouching for the correctness of the output y of a function f computed on the outsourced data, i.e. y = f (m1,., mt). The notion of HAs studied so far, however, only supports executions of computations over data authenticated by a single user. Motivated by realistic scenarios in which large datasets include data provided by multiple users, we study the concept of multi-key homomorphic authenticators. In a nutshell, multi-key HAs are like HAs with the extra feature of allowing the holder of public evaluation keys to compute on data authenticated under different secret keys. In this paper, we introduce and formally define multi-key HAs. Secondly, we propose a construction of a multi-key homomorphic signature based on standard lattices and supporting the evaluation of circuits of bounded polynomial depth. Thirdly, we provide a construction of multi-key homomorphic MACs based only on pseudorandom functions and supporting the evaluation of low-degree arithmetic circuits.
引用
收藏
页码:618 / 638
页数:21
相关论文
共 40 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6056, P161
[2]  
Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
[3]  
Ajtai M., 1996, P STOC 96 PHILADELPH, P99
[4]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[5]  
[Anonymous], 2013, P 2013 ACM SIGSAC C
[6]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[7]  
Bitansky N, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P111
[8]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[9]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[10]  
Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68