We define and construct a new primitive called a fully homomorphic message authenticator. With such scheme, anybody can perform arbitrary computations over authenticated data and produce a short tag that authenticates the result of the computation (without knowing the secret key). This tag can be verified using the secret key to ensure that the claimed result is indeed the correct output of the specified computation over previously authenticated data (without knowing the underlying data). For example, Alice can upload authenticated data to "the cloud", which then performs some specified computations over this data and sends the output to Bob, along with a short tag that convinces Bob of correctness. Alice and Bob only share a secret key, and Bob never needs to know Alice's underlying data. Our construction relies on fully homomorphic encryption to build fully homomorphic message authenticators. © 2013 Springer-Verlag.
CITATION STYLE
Gennaro, R., & Wichs, D. (2013). Fully homomorphic message authenticators. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8270 LNCS, pp. 301–320). https://doi.org/10.1007/978-3-642-42045-0_16
Mendeley helps you to discover research relevant for your work.