Computing on Authenticated Data for Adjustable Predicates
The notion of P-homomorphic signatures, introduced by Ahn et al. (TCC 2012), generalizes various approaches for public computations on authenticated data. For a given predicate P anyone can derive a signature for a message m′ from the signatures of a set of messages M, as long as P(M, m′) = 1. This definition hence comprises notions and constructions for concrete predicates P such as homomorphic signatures and redactable signatures.
In our work we address the question of how to combine P i - homomorphic schemes for different predicates P 1,P 2,… to create a richer and more flexible class of supported predicates. One approach is to statically combine schemes for predicates into new schemes for logical formulas over the predicates, such as a scheme for AND (P 1 ∧ P 2). The other approach for more flexibility is to derive schemes which allow the signer to dynamically decide which predicate to use when signing a message, instead of supporting only a single, fixed predicate.
We present two main results. One is to show that one can indeed devise solutions for the static combination for AND, and for dynamically adjustable solutions for choosing the predicate on the fly. Moreover, our constructions are practical and add only a negligible overhead. The other main result is an impossibility result for static combinations. Namely, we prove that, in contrast to the case of AND, many other formulas like the logical OR (P 1 ∨ P 2) and the NOT (¬P) do not admit generic combinations through so-called canonical constructions. This implies that one cannot rely on general constructions in these cases, but must use other methods instead, like finding new predicate-specific solutions from scratch.
KeywordsSignature Scheme Network Code Impossibility Result Authenticate Data Message Space
Unable to display preview. Download preview PDF.
- 14.Desmedt, Y.: Computer security by redefining what a computer is. In: Proceedings of the 1992-1993 Workshop on New Security Paradigms, NSPW 1992-1993, pp. 1992–1993. ACM (1993)Google Scholar
- 17.Haber, S., Hatano, Y., Honda, Y., Horne, W., Miyazaki, K., Sander, T., Tezoku, S., Yao, D.: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In: Abe, M., Gligor, V. (eds.) ASIACCS 2008, pp. 353–362. ACM Press (March 2008)Google Scholar
- 21.Miyazaki, K., Susaki, S., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H.: Digital documents sanitizing problem. Technical Report ISEC2003-20. IEICE (2003)Google Scholar