Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Homomorphic Signature Schemes - Giulia Traverso, Denise Demirel, Johannes Buchmann

Homomorphic Signature Schemes

A Survey
Buch | Softcover
XI, 64 Seiten
2016 | 1st ed. 2016
Springer International Publishing (Verlag)
978-3-319-32114-1 (ISBN)
CHF 74,85 inkl. MwSt
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

'1 From Digital to Homomorphic Signature Schemes 1.1 Digital Signatures 1.2 Digital Signature Schemes Security Definition 1.2.1 Known-Message Attack 1.2.2 Chosen-Message Attack 1.2.3 Adaptive Chosen-Message Attack 1.3 Homomorphic Signature Schemes 1.4 Homomorphic Signature Schemes Security Definition 2 Homomorphic Signature Schemes 2.1 Homomorphic Signature Schemes for the Single-User Scenario 2.1.1 Linearly Homomorphic Signature Schemes 2.1.2 Homomorphic Signature Schemes for Polynomial Functions 2.1.3 Fully Homomorphic Signatures 2.2 Homomorphic Signature Schemes for the Multi-Users Scenario 2.2.1 Multiple Sources Homomorphic Signature Schemes 2.2.2 Homomorphic Aggregate Signature Schemes 3 Evaluation of Homomorphic Signature Schemes 3.1 Hardness Assumptions 3.1.1 Bilinear Groups 3.1.2 RSA 3.1.3 Lattices 3.2 Efficiency and Size 3.3 Security 3.3.1 Weak Adversary 3.3.2 Strong Adversary 3.4 Privacy 3.5 Random Oracle Model vs. Standard Model
4 State of the Art of Homomorphic Signature Schemes 4.1 Linearly Homomorphic Signature Schemes Defined Over Bilinear Groups 4.1.1 Signing a Linear Subspace: Signature Schemes for Network Coding, by Boneh et al. (2009) 4.1.2 Homomorphic Network Coding Signatures in the Standard Model, by Attrapadung and Libert (2011) 4.1.3 Computing on Authenticated Data: New Privacy Definitions and Constructions, by Attrapadung et al. (2012) 4.1.4 Efficient Network Coding Signatures in the Standard Model, by Catalano et al. (2012) 4.1.5 Improved Security for Linearly Homomorphic Signatures: A Generic Framework, by Freeman (2012) <4.1.6 Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures, by Attrapadung et al. (2013) 4.1.7 Secure Network Coding Against Intra/Inter-Generation Pollution Attacks, by Guangjun et al. (2013) 4.1.8 Summary of Linearly Homomorphic Signature Schemes Defined Over Bilinear Groups 4.2 RSA-Based Linearly Homomorphic Signature Schemes 4.2.1 Secure Network Coding Over the Integers, by Gennaro et al. (2010) 4.2.2 Adaptive Pseudo-Free Groups and Applications, by Catalano et al. (2011) 4.2.3 Efficient Network Coding Signatures in the Standard Model, by Catalano et al. (2012) 4.2.4 Improved Security for Linearly Homomorphic Signatures: A Generic Framework, by Freeman (2012) 4.2.5 Summary of RSA-Based Linearly Homomorphic Signature Schemes 4.3 Lattice-Based Linearly Homomorphic Signature Schemes 4.3.1 Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures, by Boneh and Freeman (2011) 4.3.2 Lattice-Based Linearly Homomorphic Signature Scheme over Binary Fields, by Wang et al. (2013) 4.3.3 Summary of Lattice-Based Linearly Homomorphic Signature Schemes 4.4 Homomorphic Signature Schemes for Polynomial Functions 4.4.1 Homomorphic Signatures for Polynomial Functions, by Boneh and Freeman (2011) 4.4.2 Homomorphic Signatures for Polynomial Functions with Shorter Signatures, by Hiromasa et al. (2013) 4.4.3 Homomorphic Signatures with Efficient Verification for Polynomial Functions, by Catalano et al. (2014) 4.4.4 Summary of Homomorphic Signature Schemes for Polynomial Functions 4.5 Fully Homomorphic Signature Schemes 4.5.1 Leveled Fully Homomorphic Signatures from Standard Lattices, by Gorbunov et al. (2014) 4.5.2 Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Boyen et al. (2014) 4.5.3 Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures, by Wang et al. (2015) 4.5.4 Summary of Fully Homomorphic Signature Schemes 4.6 Multiple Sources Linearly Homomorphic Signature Schemes
4.6.1 Signatures for Multi-Source Network Coding, by Czap and Vajda (2010) 4.6.2 Short Signature Scheme for Multi-Source Network Coding, by Yan et al. (2011) 4.6.3 Efficient Multiple Sources Network Coding Signature in the Standard Model, by Zhang et al. (2014) 4.6.4 Summary of Multiple Sources Linearly Homomorphic Signature

Erscheinungsdatum
Reihe/Serie SpringerBriefs in Computer Science
Zusatzinfo XI, 64 p.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Mathematik
Schlagworte Computer Science • computing on authenticated data • Data Structures, Cryptology and Information Theory • Discrete Mathematics • electronic health records • electronic voting • homomorphic signature schemes • smart cities
ISBN-10 3-319-32114-5 / 3319321145
ISBN-13 978-3-319-32114-1 / 9783319321141
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich