Practical Homomorphic Message Authenticators for Arithmetic Circuits

Article

DOI: 10.1007/s00145-016-9249-1

Cite this article as:
Catalano, D. & Fiore, D. J Cryptol (2017). doi:10.1007/s00145-016-9249-1
  • 72 Downloads

Abstract

Homomorphic message authenticators allow the holder of a (public) evaluation key to perform computations over previously authenticated data, in such a way that the produced tag \(\sigma \) can be used to certify the authenticity of the computation. More precisely, a user, knowing the secret key \(\mathsf{sk}\) used to authenticate the original data, can verify that \(\sigma \) authenticates the correct output of the computation. This primitive has been recently formalized by Gennaro and Wichs, who also showed how to realize it from fully homomorphic encryption. In this paper, we show new constructions of this primitive that, while supporting a smaller set of functionalities (i.e., polynomially bounded arithmetic circuits as opposite to boolean ones), are much more efficient and easy to implement. Moreover, our schemes can tolerate any number of (malicious) verification queries. Our first construction relies on the sole assumption that one-way functions exist, allows for arbitrary composition (i.e., outputs of previously authenticated computations can be used as inputs for new ones) but has the drawback that the size of the produced tags grows with the degree of the circuit. Our second solution, relying on the D-Diffie-Hellman Inversion assumption, offers somewhat orthogonal features as it allows for very short tags (one single group element!) but poses some restrictions on the composition side.

Keywords

Homomorphic authenticators Homomorphic MAC Verifiable computation Secure outsourcing Cloud computing 

Copyright information

© International Association for Cryptologic Research 2017

Authors and Affiliations

  1. 1.Dipartimento di Matematica e InformaticaUniversità di CataniaCataniaItaly
  2. 2.IMDEA Software InstituteMadridSpain