Functional Message Authentication Codes With Message and Function Privacy

Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message aut...

Full description

Saved in:
Bibliographic Details
Main Authors: Pu Li, Muhua Liu, Youlin Shang
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/ise2/1969519
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846107060191625216
author Pu Li
Muhua Liu
Youlin Shang
author_facet Pu Li
Muhua Liu
Youlin Shang
author_sort Pu Li
collection DOAJ
description Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs). In a functional MAC scheme, there are two types of secret keys. One is a master secret key which can be used to generate a valid tag for any messages. The other is authenticating keys for a function f, which can be used to authenticate any messages belonged to the range of f. Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. We give a functional MAC construction based on a functional encryption (FE) scheme with function privacy, a perfectly binding commitment scheme, a standard signature scheme, and a symmetric encryption scheme with semantic security. Then, we show an application of functional MAC to constructing verifiable outsourcing computation, which ensures that the client does not accept an incorrect evaluation from the server with overwhelming probability.
format Article
id doaj-art-5a3971290fd04bbd892a3ef0b3eeb514
institution Kabale University
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-5a3971290fd04bbd892a3ef0b3eeb5142024-12-27T00:00:03ZengWileyIET Information Security1751-87172024-01-01202410.1049/ise2/1969519Functional Message Authentication Codes With Message and Function PrivacyPu Li0Muhua Liu1Youlin Shang2School of Information EngineeringSchool of Information EngineeringSchool of Information EngineeringFunctional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs). In a functional MAC scheme, there are two types of secret keys. One is a master secret key which can be used to generate a valid tag for any messages. The other is authenticating keys for a function f, which can be used to authenticate any messages belonged to the range of f. Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. We give a functional MAC construction based on a functional encryption (FE) scheme with function privacy, a perfectly binding commitment scheme, a standard signature scheme, and a symmetric encryption scheme with semantic security. Then, we show an application of functional MAC to constructing verifiable outsourcing computation, which ensures that the client does not accept an incorrect evaluation from the server with overwhelming probability.http://dx.doi.org/10.1049/ise2/1969519
spellingShingle Pu Li
Muhua Liu
Youlin Shang
Functional Message Authentication Codes With Message and Function Privacy
IET Information Security
title Functional Message Authentication Codes With Message and Function Privacy
title_full Functional Message Authentication Codes With Message and Function Privacy
title_fullStr Functional Message Authentication Codes With Message and Function Privacy
title_full_unstemmed Functional Message Authentication Codes With Message and Function Privacy
title_short Functional Message Authentication Codes With Message and Function Privacy
title_sort functional message authentication codes with message and function privacy
url http://dx.doi.org/10.1049/ise2/1969519
work_keys_str_mv AT puli functionalmessageauthenticationcodeswithmessageandfunctionprivacy
AT muhualiu functionalmessageauthenticationcodeswithmessageandfunctionprivacy
AT youlinshang functionalmessageauthenticationcodeswithmessageandfunctionprivacy