Homomorphic Signature Schemes View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2002-02-08

AUTHORS

Robert Johnson , David Molnar , Dawn Song , David Wagner

ABSTRACT

Privacy homomorphisms, encryption schemes that are also homomorphisms relative to some binary operation, have been studied for some time, but one may also consider the analogous problem of homomorphic signature schemes. In this paper we introduce basic definitions of security for homomorphic signature systems, motivate the inquiry with example applications, and describe several schemes that are homomorphic with respect to useful binary operations. In particular, we describe a scheme that allows a signature holder to construct the signature on an arbitrarily redacted submessage of the originally signed message. We present another scheme for signing sets that is homomorphic with respect to both union and taking subsets. Finally, we show that any signature scheme that is homomorphic with respect to integer addition must be insecure. More... »

PAGES

244-262

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-45760-7_17

DOI

http://dx.doi.org/10.1007/3-540-45760-7_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026118337


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of California at Berkeley, Berkeley", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California at Berkeley, Berkeley"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Johnson", 
        "givenName": "Robert", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ShieldIP, USA", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "ShieldIP, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Molnar", 
        "givenName": "David", 
        "id": "sg:person.013734674075.50", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013734674075.50"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California at Berkeley, Berkeley", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California at Berkeley, Berkeley"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Song", 
        "givenName": "Dawn", 
        "id": "sg:person.01143152610.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California at Berkeley, Berkeley", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California at Berkeley, Berkeley"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wagner", 
        "givenName": "David", 
        "id": "sg:person.015117535217.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015117535217.32"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2002-02-08", 
    "datePublishedReg": "2002-02-08", 
    "description": "Privacy homomorphisms, encryption schemes that are also homomorphisms relative to some binary operation, have been studied for some time, but one may also consider the analogous problem of homomorphic signature schemes. In this paper we introduce basic definitions of security for homomorphic signature systems, motivate the inquiry with example applications, and describe several schemes that are homomorphic with respect to useful binary operations. In particular, we describe a scheme that allows a signature holder to construct the signature on an arbitrarily redacted submessage of the originally signed message. We present another scheme for signing sets that is homomorphic with respect to both union and taking subsets. Finally, we show that any signature scheme that is homomorphic with respect to integer addition must be insecure.", 
    "editor": [
      {
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-45760-7_17", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-43224-1", 
        "978-3-540-45760-2"
      ], 
      "name": "Topics in Cryptology \u2014 CT-RSA 2002", 
      "type": "Book"
    }, 
    "keywords": [
      "homomorphic signature scheme", 
      "signature scheme", 
      "privacy homomorphism", 
      "encryption scheme", 
      "signature system", 
      "signature holder", 
      "example application", 
      "integer addition", 
      "scheme", 
      "binary operation", 
      "security", 
      "basic definitions", 
      "submessages", 
      "messages", 
      "operation", 
      "set", 
      "analogous problem", 
      "applications", 
      "system", 
      "definition", 
      "respect", 
      "subset", 
      "homomorphism", 
      "signatures", 
      "one", 
      "time", 
      "holder", 
      "problem", 
      "addition", 
      "inquiry", 
      "Union", 
      "paper"
    ], 
    "name": "Homomorphic Signature Schemes", 
    "pagination": "244-262", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026118337"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-45760-7_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-45760-7_17", 
      "https://app.dimensions.ai/details/publication/pub.1026118337"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:43", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_198.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-45760-7_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-45760-7_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-45760-7_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-45760-7_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-45760-7_17'


 

This table displays all metadata directly associated to this object as RDF triples.

115 TRIPLES      23 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-45760-7_17 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N6df48eb5f3a9409d9ddb6beee496a4f7
4 schema:datePublished 2002-02-08
5 schema:datePublishedReg 2002-02-08
6 schema:description Privacy homomorphisms, encryption schemes that are also homomorphisms relative to some binary operation, have been studied for some time, but one may also consider the analogous problem of homomorphic signature schemes. In this paper we introduce basic definitions of security for homomorphic signature systems, motivate the inquiry with example applications, and describe several schemes that are homomorphic with respect to useful binary operations. In particular, we describe a scheme that allows a signature holder to construct the signature on an arbitrarily redacted submessage of the originally signed message. We present another scheme for signing sets that is homomorphic with respect to both union and taking subsets. Finally, we show that any signature scheme that is homomorphic with respect to integer addition must be insecure.
7 schema:editor N56d17f88a0434855adbace8461eab0d8
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nef9e7f0c6ee34b7e87a8a508ffdff36b
12 schema:keywords Union
13 addition
14 analogous problem
15 applications
16 basic definitions
17 binary operation
18 definition
19 encryption scheme
20 example application
21 holder
22 homomorphic signature scheme
23 homomorphism
24 inquiry
25 integer addition
26 messages
27 one
28 operation
29 paper
30 privacy homomorphism
31 problem
32 respect
33 scheme
34 security
35 set
36 signature holder
37 signature scheme
38 signature system
39 signatures
40 submessages
41 subset
42 system
43 time
44 schema:name Homomorphic Signature Schemes
45 schema:pagination 244-262
46 schema:productId N48aab214e57d4a83a5c19f713b9449b6
47 Nbd11798a5fcc4ba48907b946b830e4c3
48 schema:publisher N20ec503920b84b4388085cbb77da86ea
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026118337
50 https://doi.org/10.1007/3-540-45760-7_17
51 schema:sdDatePublished 2022-05-20T07:43
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N8cf5291fd2c64559b89a545a1f41b5ef
54 schema:url https://doi.org/10.1007/3-540-45760-7_17
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N1ca04ae524024bd28992c3618f855507 rdf:first sg:person.015117535217.32
59 rdf:rest rdf:nil
60 N20ec503920b84b4388085cbb77da86ea schema:name Springer Nature
61 rdf:type schema:Organisation
62 N48aab214e57d4a83a5c19f713b9449b6 schema:name doi
63 schema:value 10.1007/3-540-45760-7_17
64 rdf:type schema:PropertyValue
65 N4cd6222bdac7462f8843ed95353a34ae schema:familyName Preneel
66 schema:givenName Bart
67 rdf:type schema:Person
68 N56d17f88a0434855adbace8461eab0d8 rdf:first N4cd6222bdac7462f8843ed95353a34ae
69 rdf:rest rdf:nil
70 N6175ec52834748b3ab73c57f8817e995 schema:affiliation grid-institutes:grid.47840.3f
71 schema:familyName Johnson
72 schema:givenName Robert
73 rdf:type schema:Person
74 N6d1ba7a19f2842d1a2379ab449a7558e rdf:first sg:person.013734674075.50
75 rdf:rest Ne0d4a6a6940b4bfb89e3f355120811b7
76 N6df48eb5f3a9409d9ddb6beee496a4f7 rdf:first N6175ec52834748b3ab73c57f8817e995
77 rdf:rest N6d1ba7a19f2842d1a2379ab449a7558e
78 N8cf5291fd2c64559b89a545a1f41b5ef schema:name Springer Nature - SN SciGraph project
79 rdf:type schema:Organization
80 Nbd11798a5fcc4ba48907b946b830e4c3 schema:name dimensions_id
81 schema:value pub.1026118337
82 rdf:type schema:PropertyValue
83 Ne0d4a6a6940b4bfb89e3f355120811b7 rdf:first sg:person.01143152610.86
84 rdf:rest N1ca04ae524024bd28992c3618f855507
85 Nef9e7f0c6ee34b7e87a8a508ffdff36b schema:isbn 978-3-540-43224-1
86 978-3-540-45760-2
87 schema:name Topics in Cryptology — CT-RSA 2002
88 rdf:type schema:Book
89 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
90 schema:name Information and Computing Sciences
91 rdf:type schema:DefinedTerm
92 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
93 schema:name Data Format
94 rdf:type schema:DefinedTerm
95 sg:person.01143152610.86 schema:affiliation grid-institutes:grid.47840.3f
96 schema:familyName Song
97 schema:givenName Dawn
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86
99 rdf:type schema:Person
100 sg:person.013734674075.50 schema:affiliation grid-institutes:None
101 schema:familyName Molnar
102 schema:givenName David
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013734674075.50
104 rdf:type schema:Person
105 sg:person.015117535217.32 schema:affiliation grid-institutes:grid.47840.3f
106 schema:familyName Wagner
107 schema:givenName David
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015117535217.32
109 rdf:type schema:Person
110 grid-institutes:None schema:alternateName ShieldIP, USA
111 schema:name ShieldIP, USA
112 rdf:type schema:Organization
113 grid-institutes:grid.47840.3f schema:alternateName University of California at Berkeley, Berkeley
114 schema:name University of California at Berkeley, Berkeley
115 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...