Abstract
Homomorphic signature schemes provide a feasible solution to the authenticity of computations on an untrusted server (e.g. cloud). In a homomorphic signature scheme, given a k -length message set µ = {µ1, µ2,…, µk} and its corresponding signed dataset δ = {δ 1,δ 2,…,δ k}, anyone can publicly perform homomorphic computations and produce a new signature δ ' for the messages µ ' = f (µ1, µ2,…, µ k), where f is a function or a circuit. If the generated homomorphic signature δ' is valid, then the owner of the dataset (e.g. cloud users) convinces that µ ' is indeed the correct output of the function f over the original messages even if he/she forgets them. In this work, the main contribution is to build a bridge between the leveled Fully Homomorphic Signature Scheme (FHSS) and Homomorphic Chameleon Hash Function (HCHF), which is a new cryptographic primitive introduced by us based on prior works. We first present the definition and specific construction of HCHF and then use this forceful technique to construct leveled fully homomorphic signature schemes for any polynomial-depth circuit. In our standard model scheme, the size of evaluated homomorphic signature grows polynomially in the depth of the circuit. The security of our scheme is based on the property of collision resistance of HCHF, which can be reduced to the Small Integer Solution (SIS) in hard random lattices.
Author supplied keywords
Cite
CITATION STYLE
Xie, D., Peng, H., Li, L., & Yang, Y. (2017). Homomorphic signature from chameleon hash functions. Information Technology and Control, 46(2), 108–120. https://doi.org/10.5755/j01.itc.46.2.14320
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.