{"id":1964,"date":"2017-08-02T07:30:32","date_gmt":"2017-08-02T07:30:32","guid":{"rendered":"https:\/\/prismacloud.eu\/?p=1964"},"modified":"2018-04-03T12:32:39","modified_gmt":"2018-04-03T12:32:39","slug":"linearly-homomorphic-authenticated-encryption-with-provable-correctness-and-public-verifiability","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/linearly-homomorphic-authenticated-encryption-with-provable-correctness-and-public-verifiability\/","title":{"rendered":"Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability"},"content":{"rendered":"<p><strong>Title<\/strong><\/p>\n<p>Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability<\/p>\n<p><strong>Authors<\/strong><\/p>\n<p>Johannes Buchmann, Denise Demirel, Lucas, Schabh\u00fcser, Patrick Struck<\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p style=\"text-align: justify;\">In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called\u00a0<span id=\"IEq1\" class=\"InlineEquation\"><span id=\"MathJax-Element-1-Frame\" class=\"MathJax\" style=\"box-sizing: border-box; display: inline-table; font-style: normal; font-weight: normal; line-height: normal; font-size: 17px; text-indent: 0px; text-align: left; text-transform: none; letter-spacing: normal; word-spacing: normal; word-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; position: relative;\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mrow class=&quot;MJX-TeXAtom-ORD&quot;&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;L&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;E&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;P&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;C&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;o&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;V&lt;\/mi&gt;&lt;\/mrow&gt;&lt;\/math&gt;\"><span id=\"MathJax-Span-1\" class=\"math\"><span id=\"MathJax-Span-2\" class=\"mrow\"><span id=\"MathJax-Span-3\" class=\"texatom\"><span id=\"MathJax-Span-4\" class=\"mrow\"><span id=\"MathJax-Span-5\" class=\"mi\">L<\/span><span id=\"MathJax-Span-6\" class=\"mi\">E<\/span><span id=\"MathJax-Span-7\" class=\"mi\">P<\/span><\/span><\/span><\/span><\/span><span class=\"MJX_Assistive_MathML\" role=\"presentation\">CoV<\/span><\/span><\/span>, is presented. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed description of\u00a0<span id=\"IEq2\" class=\"InlineEquation\"><span id=\"MathJax-Element-2-Frame\" class=\"MathJax\" style=\"box-sizing: border-box; display: inline-table; font-style: normal; font-weight: normal; line-height: normal; font-size: 17px; text-indent: 0px; text-align: left; text-transform: none; letter-spacing: normal; word-spacing: normal; word-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; position: relative;\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mrow class=&quot;MJX-TeXAtom-ORD&quot;&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;L&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;E&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;P&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;C&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;o&lt;\/mi&gt;&lt;mi mathvariant=&quot;sans-serif&quot;&gt;V&lt;\/mi&gt;&lt;\/mrow&gt;&lt;\/math&gt;\"><span id=\"MathJax-Span-11\" class=\"math\"><span id=\"MathJax-Span-12\" class=\"mrow\"><span id=\"MathJax-Span-13\" class=\"texatom\"><span id=\"MathJax-Span-14\" class=\"mrow\"><span id=\"MathJax-Span-15\" class=\"mi\">L<\/span><span id=\"MathJax-Span-16\" class=\"mi\">E<\/span><span id=\"MathJax-Span-17\" class=\"mi\">P<\/span><\/span><\/span><\/span><\/span><span class=\"MJX_Assistive_MathML\" role=\"presentation\">CoV<\/span><\/span><\/span>, a comparison with the original scheme, a security and correctness proof, and a performance analysis showing that all algorithms run in reasonable time for parameters that are currently considered secure. The scheme presented here allows a user to outsource computations on encrypted data to the cloud, such that any third party can verify the correctness of the computations without having access to the original data. This makes this work an important contribution to cloud computing and applications where operations on sensitive data have to be performed, such as statistics on medical records and tallying of electronically cast votes.<\/p>\n<p><strong>Venue\u00a0<\/strong><\/p>\n<p>Codes, Cryptology and Information Security - Second International Conference (C2SI), 2017<\/p>\n<p><strong>Place and Date<\/strong><\/p>\n<p>Rabat, Morocco, April 10 -12, 2017<\/p>\n<p>[<a href=\"https:\/\/eprint.iacr.org\/2017\/700\">Download<\/a>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called\u00a0 LEPCoV , is presented. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed description of\u00a0 LEPCoV , a comparison with the original scheme, a security and correctness proof, and a performance analysis showing that all algorithms run in reasonable time for parameters that are currently considered secure. The scheme presented here allows a user to outsource computations on encrypted data to the cloud, such that any third party can verify the correctness of the computations without having access to the original data. This makes this work an important contribution to cloud computing and applications where operations on sensitive data have to be performed, such as statistics on medical records and tallying of electronically cast votes.<\/p>\n","protected":false},"author":2,"featured_media":1575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1964"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=1964"}],"version-history":[{"count":5,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1964\/revisions"}],"predecessor-version":[{"id":2610,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1964\/revisions\/2610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/1575"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=1964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=1964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=1964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}