Fully homomorphic message authenticators

98Citations
Citations of this article
75Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We define and construct a new primitive called a fully homomorphic message authenticator. With such scheme, anybody can perform arbitrary computations over authenticated data and produce a short tag that authenticates the result of the computation (without knowing the secret key). This tag can be verified using the secret key to ensure that the claimed result is indeed the correct output of the specified computation over previously authenticated data (without knowing the underlying data). For example, Alice can upload authenticated data to "the cloud", which then performs some specified computations over this data and sends the output to Bob, along with a short tag that convinces Bob of correctness. Alice and Bob only share a secret key, and Bob never needs to know Alice's underlying data. Our construction relies on fully homomorphic encryption to build fully homomorphic message authenticators. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Gennaro, R., & Wichs, D. (2013). Fully homomorphic message authenticators. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8270 LNCS, pp. 301–320). https://doi.org/10.1007/978-3-642-42045-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free