Functional Message Authentication Codes With Message and Function Privacy
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message aut...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2024-01-01
|
| Series: | IET Information Security |
| Online Access: | http://dx.doi.org/10.1049/ise2/1969519 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846107060191625216 |
|---|---|
| author | Pu Li Muhua Liu Youlin Shang |
| author_facet | Pu Li Muhua Liu Youlin Shang |
| author_sort | Pu Li |
| collection | DOAJ |
| description | Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs). In a functional MAC scheme, there are two types of secret keys. One is a master secret key which can be used to generate a valid tag for any messages. The other is authenticating keys for a function f, which can be used to authenticate any messages belonged to the range of f. Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. We give a functional MAC construction based on a functional encryption (FE) scheme with function privacy, a perfectly binding commitment scheme, a standard signature scheme, and a symmetric encryption scheme with semantic security. Then, we show an application of functional MAC to constructing verifiable outsourcing computation, which ensures that the client does not accept an incorrect evaluation from the server with overwhelming probability. |
| format | Article |
| id | doaj-art-5a3971290fd04bbd892a3ef0b3eeb514 |
| institution | Kabale University |
| issn | 1751-8717 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Information Security |
| spelling | doaj-art-5a3971290fd04bbd892a3ef0b3eeb5142024-12-27T00:00:03ZengWileyIET Information Security1751-87172024-01-01202410.1049/ise2/1969519Functional Message Authentication Codes With Message and Function PrivacyPu Li0Muhua Liu1Youlin Shang2School of Information EngineeringSchool of Information EngineeringSchool of Information EngineeringFunctional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs). In a functional MAC scheme, there are two types of secret keys. One is a master secret key which can be used to generate a valid tag for any messages. The other is authenticating keys for a function f, which can be used to authenticate any messages belonged to the range of f. Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. We give a functional MAC construction based on a functional encryption (FE) scheme with function privacy, a perfectly binding commitment scheme, a standard signature scheme, and a symmetric encryption scheme with semantic security. Then, we show an application of functional MAC to constructing verifiable outsourcing computation, which ensures that the client does not accept an incorrect evaluation from the server with overwhelming probability.http://dx.doi.org/10.1049/ise2/1969519 |
| spellingShingle | Pu Li Muhua Liu Youlin Shang Functional Message Authentication Codes With Message and Function Privacy IET Information Security |
| title | Functional Message Authentication Codes With Message and Function Privacy |
| title_full | Functional Message Authentication Codes With Message and Function Privacy |
| title_fullStr | Functional Message Authentication Codes With Message and Function Privacy |
| title_full_unstemmed | Functional Message Authentication Codes With Message and Function Privacy |
| title_short | Functional Message Authentication Codes With Message and Function Privacy |
| title_sort | functional message authentication codes with message and function privacy |
| url | http://dx.doi.org/10.1049/ise2/1969519 |
| work_keys_str_mv | AT puli functionalmessageauthenticationcodeswithmessageandfunctionprivacy AT muhualiu functionalmessageauthenticationcodeswithmessageandfunctionprivacy AT youlinshang functionalmessageauthenticationcodeswithmessageandfunctionprivacy |