Multi-Key Homomorphic Signatures Unforgeable under Insider - - PowerPoint PPT Presentation

multi key homomorphic signatures unforgeable under
SMART_READER_LITE
LIVE PREVIEW

Multi-Key Homomorphic Signatures Unforgeable under Insider - - PowerPoint PPT Presentation

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F. Lai 1,2 , Raymond K. H. Tai 2 , Harry W. H. Wong 2 , Sherman S. M. Chow 2 1 Friedrich-Alexander University Erlangen-Nuremberg 2 Chinese University of Hong Kong


slide-1
SLIDE 1

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption

Russell W. F. Lai1,2, Raymond K. H. Tai2, Harry W. H. Wong2, Sherman S. M. Chow2

1Friedrich-Alexander University Erlangen-Nuremberg 2Chinese University of Hong Kong

slide-2
SLIDE 2

Useful multi-key homomorphic signatures likely require strong assumptions.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 1/16

slide-3
SLIDE 3

Overview

We introduce a strong but natural unforgeability notion of (multi-key) homomorphic signatures.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 2/16

slide-4
SLIDE 4

Overview

We introduce a strong but natural unforgeability notion of (multi-key) homomorphic signatures. The property is essential for natural applications, e.g., verifiable MPC.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 2/16

slide-5
SLIDE 5

Overview

We introduce a strong but natural unforgeability notion of (multi-key) homomorphic signatures. The property is essential for natural applications, e.g., verifiable MPC. We draw connections of the notion to zk-SNARG/Ks.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 2/16

slide-6
SLIDE 6

Homomorphic Signatures

I signed m. Alice Evaluator Verifier

σ A

m

slide-7
SLIDE 7

Homomorphic Signatures

You can evaluate any function on it. Alice Evaluator Verifier

σ A

m

slide-8
SLIDE 8

Homomorphic Signatures

Let’s do f(m). Alice Evaluator Verifier

σ A

f(m),f

slide-9
SLIDE 9

Homomorphic Signatures

Looks legit. Alice Evaluator Verifier

σ A

f(m),f Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 3/16

slide-10
SLIDE 10

Unforgeability of Homomorphic Signatures

I signed m. Alice Adversary Verifier

σ A

m

slide-11
SLIDE 11

Unforgeability of Homomorphic Signatures

You can evaluate any function on it. Alice Adversary Verifier

σ A

m

slide-12
SLIDE 12

Unforgeability of Homomorphic Signatures

Let’s pretend m∗ = f(m). Alice Adversary Verifier

σ A

m∗,f

slide-13
SLIDE 13

Unforgeability of Homomorphic Signatures

Smells fishy. Alice Adversary Verifier

σ A

m∗,f Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 4/16

slide-14
SLIDE 14

Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

I signed mA. I signed mB. Alice Bob Evaluator Verifier

σ A

mA

σ B

mB

slide-15
SLIDE 15

Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

You can evaluate any function

  • n them.

Alice Bob Evaluator Verifier

σ A

mA,σ B mB

slide-16
SLIDE 16

Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

Let’s do f(mA,mB). Alice Bob Evaluator Verifier

σ

A,B f(mA,mB),f

slide-17
SLIDE 17

Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

Looks legit. Alice Bob Evaluator Verifier

σ

A,B f(mA,mB),f Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 5/16

slide-18
SLIDE 18

Unforgeability of Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

I signed mA. I signed mB. Alice Bob Adversary Verifier

σ A

mA

σ B

mB

slide-19
SLIDE 19

Unforgeability of Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

You can evaluate any function

  • n them.

Alice Bob Adversary Verifier

σ A

mA,σ B mB

slide-20
SLIDE 20

Unforgeability of Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

Let’s pretend m∗ = f(mA,mB). Alice Bob Adversary Verifier

σ

A,B m∗,f

slide-21
SLIDE 21

Unforgeability of Multi-key Homomorphic Signatures [FMNP, Asiacrypt16]

Smells fishy. Alice Bob Adversary Verifier

σ

A,B m∗,f Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 6/16

slide-22
SLIDE 22

Insider Attack?

I signed mA. Here is my secret key skB. Alice Bob Adversary Verifier

σ A

mA

slide-23
SLIDE 23

Insider Attack?

You can evaluate any function

  • n them.

Let’s mess with Alice. Alice Bob Adversary Verifier

σ A

mA

slide-24
SLIDE 24

Insider Attack?

Let’s pretend m∗ = f(mA,mB). Alice Bob Adversary Verifier

σ

A,B m∗,f

slide-25
SLIDE 25

Insider Attack?

Sounds...... legit? Alice Bob Adversary Verifier

σ

A,B m∗,f Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 7/16

slide-26
SLIDE 26

Unforgeability of (Multi-Key) Homomorphic Signatures under Insider Corruption

  • A can query sign oracle on (id,m), which does the following:
  • Generate (pkid,skid) and record id as honest if not done already.
  • Sign m using skid as σ id

m and record m in the set Mid.

  • Return (pkid,σ id

m).

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 8/16

slide-27
SLIDE 27

Unforgeability of (Multi-Key) Homomorphic Signatures under Insider Corruption

  • A can query sign oracle on (id,m), which does the following:
  • Generate (pkid,skid) and record id as honest if not done already.
  • Sign m using skid as σ id

m and record m in the set Mid.

  • Return (pkid,σ id

m).

  • A produces (f ∗,{pk∗

id1,...,pk∗ idk},m∗,σ∗).

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 8/16

slide-28
SLIDE 28

Unforgeability of (Multi-Key) Homomorphic Signatures under Insider Corruption

  • A can query sign oracle on (id,m), which does the following:
  • Generate (pkid,skid) and record id as honest if not done already.
  • Sign m using skid as σ id

m and record m in the set Mid.

  • Return (pkid,σ id

m).

  • A produces (f ∗,{pk∗

id1,...,pk∗ idk},m∗,σ∗).

  • A wins if the following hold:
  • Vf(f ∗,{pk∗

id1,...,pk∗ idk},m∗,σ∗) = 1.

  • If id is honest, then pk∗

id = pkid.

  • m∗ is not in the range of f ∗, when the inputs of honest id are restricted to those recorded in Mid,

i.e., m∗ /

  • f ∗(m1,...,mk) :
  • mi ∈ M

idi is malicious mi ∈ Midi idi is honest

  • Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption

Russell W. F . Lai 8/16

slide-29
SLIDE 29

Unforgeability of (Multi-Key) Homomorphic Signatures under Insider Corruption

  • A can query sign oracle on (id,m), which does the following:
  • Generate (pkid,skid) and record id as honest if not done already.
  • Sign m using skid as σ id

m and record m in the set Mid.

  • Return (pkid,σ id

m).

  • A produces (f ∗,{pk∗

id1,...,pk∗ idk},m∗,σ∗).

  • A wins if the following hold:
  • Vf(f ∗,{pk∗

id1,...,pk∗ idk},m∗,σ∗) = 1.

  • If id is honest, then pk∗

id = pkid.

  • m∗ is not in the range of f ∗, when the inputs of honest id are restricted to those recorded in Mid,

i.e., m∗ /

  • f ∗(m1,...,mk) :
  • mi ∈ M

idi is malicious mi ∈ Midi idi is honest

  • Remark
  • The definition still makes sense even with one key, i.e., k = 1.
  • It means that even the signer cannot produce σm,f for m not in the range of f.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 8/16

slide-30
SLIDE 30

Why is the notion meaningful?

Example 1: Number of keys k > 1

  • f ∗(m1,...,mk) = MAJORITY(m1,...,mk)
  • idk malicious
  • idi honest, Midi = {NO}, for all i = 1,...,k − 1
  • Infeasible to forge (MAJORITY,{pk∗

id1,...,pk∗ idk},m∗ = YES,σ∗)

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 9/16

slide-31
SLIDE 31

Why is the notion meaningful?

Example 1: Number of keys k > 1

  • f ∗(m1,...,mk) = MAJORITY(m1,...,mk)
  • idk malicious
  • idi honest, Midi = {NO}, for all i = 1,...,k − 1
  • Infeasible to forge (MAJORITY,{pk∗

id1,...,pk∗ idk},m∗ = YES,σ∗)

Example 2: Number of keys k = 1

  • C: Unsatisfiable Boolean circuit
  • f ∗(m) = C(m)
  • Infeasible to forge (C,pk,m∗ = 1,σ∗)

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 9/16

slide-32
SLIDE 32

Other Properties of (Multi-key) Homomorphic Signatures

(Weakly) Context-Hiding σf(m),f reveals nothing about m. Succinctness Size of σf(m),f is independent of the size of m and f.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 10/16

slide-33
SLIDE 33

Preliminary: zk-(O-)SNARG/Ks

Argument systems which allow a prover to prove to the verifier: There exists a witness w such that the relation R(x,w) = 1 holds for the statement x. zero-knowledge : Proofs reveal nothing about witnesses. Oracle : Sound even if the prover has access to certain (e.g., signing) oracles. Succinct : Proof size is independent of witness size. Non-Interactive : The prover only sends 1 message to the verifier. ARGguments : The system is computationally sound. ARguments of Knowledge : There exists an extractor which extracts witnesses from provers.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 11/16

slide-34
SLIDE 34

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-35
SLIDE 35

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

  • 1-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ zk-SNARGs

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-36
SLIDE 36

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

  • 1-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ zk-SNARGs

  • 2-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ Functional Signatures

  • Functional Signatures =

⇒ zk-SNARGs [Boyle-Goldwasser-Ivan, PKC14]

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-37
SLIDE 37

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

  • 1-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ zk-SNARGs

  • 2-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ Functional Signatures

  • Functional Signatures =

⇒ zk-SNARGs [Boyle-Goldwasser-Ivan, PKC14]

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-38
SLIDE 38

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

  • 1-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ zk-SNARGs

  • 2-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ Functional Signatures

  • Functional Signatures =

⇒ zk-SNARGs [Boyle-Goldwasser-Ivan, PKC14]

Theorem (Gentry-Wichs, STOC11)

No SNARGs can be proven adaptive sound via a black-box reduction from any falsifiable assumption.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-39
SLIDE 39

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

  • 1-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ zk-SNARGs

  • 2-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ Functional Signatures

  • Functional Signatures =

⇒ zk-SNARGs [Boyle-Goldwasser-Ivan, PKC14]

Theorem (Gentry-Wichs, STOC11)

No SNARGs can be proven adaptive sound via a black-box reduction from any falsifiable assumption.

Corollary

Homomorphic signatures cannot be proven unforgeable under insider corruption via a black-box reduction from any falsifiable assumption.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-40
SLIDE 40

Roadmap

  • zk-(O-)SNARKs + Signatures =

⇒ Insider Unforgeable Multi-key Homomorphic Signatures.

  • 1-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ zk-SNARGs

  • 2-key 1-hop Insider Unforgeable Homomorphic Signatures =

⇒ Functional Signatures

  • Functional Signatures =

⇒ zk-SNARGs [Boyle-Goldwasser-Ivan, PKC14]

Theorem (Gentry-Wichs, STOC11)

No SNARGs can be proven adaptive sound via a black-box reduction from any falsifiable assumption.

Corollary

Homomorphic signatures cannot be proven unforgeable under insider corruption via a black-box reduction from any falsifiable assumption (assuming messages can depend on public parameters).

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 12/16

slide-41
SLIDE 41

Construction of Homomorphic Signatures

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ
slide-42
SLIDE 42

Construction of Homomorphic Signatures

  • Public Parameters: Common reference string for Π.

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ
slide-43
SLIDE 43

Construction of Homomorphic Signatures

  • Public Parameters: Common reference string for Π.
  • Key Generation: Each user generates (pk,sk) for Σ.

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ
slide-44
SLIDE 44

Construction of Homomorphic Signatures

  • Public Parameters: Common reference string for Π.
  • Key Generation: Each user generates (pk,sk) for Σ.
  • Signing: Sign using σ ← Σ.Sig(sk,m).

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ
slide-45
SLIDE 45

Construction of Homomorphic Signatures

  • Public Parameters: Common reference string for Π.
  • Key Generation: Each user generates (pk,sk) for Σ.
  • Signing: Sign using σ ← Σ.Sig(sk,m).
  • Evaluation: Given g, {(fi,pki,mi,σ i

mi,fi)}k i=1,

  • Let h = g(f1,...,fk).
  • Compute m = g(m1,...,mk).

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ
slide-46
SLIDE 46

Construction of Homomorphic Signatures

  • Public Parameters: Common reference string for Π.
  • Key Generation: Each user generates (pk,sk) for Σ.
  • Signing: Sign using σ ← Σ.Sig(sk,m).
  • Evaluation: Given g, {(fi,pki,mi,σ i

mi,fi)}k i=1,

  • Let h = g(f1,...,fk).
  • Compute m = g(m1,...,mk).
  • Produce a zk-SNARK proof for the following statement:

“I know g and {(fi,mi,σ i

mi,fi)}k i=1 such that

h = g(f1,...,fk), m = g(m1,...,mk), and for i ∈ [k], σ i

mi,fi is valid under pki.”

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 13/16

slide-47
SLIDE 47

Construction of Homomorphic Signatures

  • Public Parameters: Common reference string for Π.
  • Key Generation: Each user generates (pk,sk) for Σ.
  • Signing: Sign using σ ← Σ.Sig(sk,m).
  • Evaluation: Given g, {(fi,pki,mi,σ i

mi,fi)}k i=1,

  • Let h = g(f1,...,fk).
  • Compute m = g(m1,...,mk).
  • Produce a zk-SNARK proof for the following statement:

“I know g and {(fi,mi,σ i

mi,fi)}k i=1 such that

h = g(f1,...,fk), m = g(m1,...,mk), and for i ∈ [k], σ i

mi,fi is valid under pki.”

  • Verification: If signature is fresh, use verification of Σ. If signature is evaluated, use verification of Π.

Ingredients

  • zk-(O-)SNARK Π
  • Digital signature scheme Σ

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 13/16

slide-48
SLIDE 48

Caution

  • On the number of hops of evaluation:

✗ “Poly-hop” evaluation requires “strong” zk-SNARK extractor whose runtime is independent of that of the

  • prover. As far as we know, no candidate construction exists.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 14/16

slide-49
SLIDE 49

Caution

  • On the number of hops of evaluation:

✗ “Poly-hop” evaluation requires “strong” zk-SNARK extractor whose runtime is independent of that of the

  • prover. As far as we know, no candidate construction exists.

✓ 1-hop is sufficient for the construction of zk-SNARG.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 14/16

slide-50
SLIDE 50

Caution

  • On the number of hops of evaluation:

✗ “Poly-hop” evaluation requires “strong” zk-SNARK extractor whose runtime is independent of that of the

  • prover. As far as we know, no candidate construction exists.

✓ 1-hop is sufficient for the construction of zk-SNARG.

  • On the existence of O-SNARKs:

✗ There exists Σ s.t. no candidate construction of O-SNARK satisfies proof of knowledge with respect to

the signing oracle of Σ. [Fiore-Nitulescu, TCC16B]

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 14/16

slide-51
SLIDE 51

Caution

  • On the number of hops of evaluation:

✗ “Poly-hop” evaluation requires “strong” zk-SNARK extractor whose runtime is independent of that of the

  • prover. As far as we know, no candidate construction exists.

✓ 1-hop is sufficient for the construction of zk-SNARG.

  • On the existence of O-SNARKs:

✗ There exists Σ s.t. no candidate construction of O-SNARK satisfies proof of knowledge with respect to

the signing oracle of Σ. [Fiore-Nitulescu, TCC16B]

✓ Use a Σ which admits an O-SNARK. [Fiore-Nitulescu, TCC16B]

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 14/16

slide-52
SLIDE 52

Construction of zk-SNARG

  • Ingredients:
  • 1-key 1-hop homomorphic signature Σ unforgeable under insider corruption
  • A circuit g such that g(x,w) =
  • x

R(x,w) = 1

  • therwise

.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 15/16

slide-53
SLIDE 53

Construction of zk-SNARG

  • Ingredients:
  • 1-key 1-hop homomorphic signature Σ unforgeable under insider corruption
  • A circuit g such that g(x,w) =
  • x

R(x,w) = 1

  • therwise

.

  • Common Reference String: Public Parameter of Σ.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 15/16

slide-54
SLIDE 54

Construction of zk-SNARG

  • Ingredients:
  • 1-key 1-hop homomorphic signature Σ unforgeable under insider corruption
  • A circuit g such that g(x,w) =
  • x

R(x,w) = 1

  • therwise

.

  • Common Reference String: Public Parameter of Σ.
  • Proving that R(x,w) = 1:
  • Generate fresh (pk,sk) for Σ.
  • Sign x and w using sk.
  • Evaluate g on the signatures and produce σx,g.
  • Output (pk,σx,g).

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 15/16

slide-55
SLIDE 55

Construction of zk-SNARG

  • Ingredients:
  • 1-key 1-hop homomorphic signature Σ unforgeable under insider corruption
  • A circuit g such that g(x,w) =
  • x

R(x,w) = 1

  • therwise

.

  • Common Reference String: Public Parameter of Σ.
  • Proving that R(x,w) = 1:
  • Generate fresh (pk,sk) for Σ.
  • Sign x and w using sk.
  • Evaluate g on the signatures and produce σx,g.
  • Output (pk,σx,g).
  • Verification of statement x and proof π = (pk,σ):
  • Output Σ.Vf(g,pk,x,σ).

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 15/16

slide-56
SLIDE 56

Construction of zk-SNARG

  • Ingredients:
  • 1-key 1-hop homomorphic signature Σ unforgeable under insider corruption
  • A circuit g such that g(x,w) =
  • x

R(x,w) = 1

  • therwise

.

  • Common Reference String: Public Parameter of Σ.
  • Proving that R(x,w) = 1:
  • Generate fresh (pk,sk) for Σ.
  • Sign x and w using sk.
  • Evaluate g on the signatures and produce σx,g.
  • Output (pk,σx,g).
  • Verification of statement x and proof π = (pk,σ):
  • Output Σ.Vf(g,pk,x,σ).

Soundness

If x∗ is a NO instance, then g(x∗,w) = ⊥ for all w.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 15/16

slide-57
SLIDE 57

Conclusion

(Multi-key) homomorphic signatures unforgeable under insider corruption imply zk-SNARGs, which likely require non-falsifiable assumptions.

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 16/16

slide-58
SLIDE 58

Conclusion

(Multi-key) homomorphic signatures unforgeable under insider corruption imply zk-SNARGs, which likely require non-falsifiable assumptions. Can we construct insider unforgeable homomorphic signatures ... directly without using zk-SNARKs? for restricted functionalities (not including g) from standard assumptions?

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 16/16

slide-59
SLIDE 59

Conclusion

(Multi-key) homomorphic signatures unforgeable under insider corruption imply zk-SNARGs, which likely require non-falsifiable assumptions. Can we construct insider unforgeable homomorphic signatures ... directly without using zk-SNARKs? for restricted functionalities (not including g) from standard assumptions?

ia.cr/2016/834

Russell W. F. Lai Friedrich-Alexander University Erlangen-Nuremberg

russell.lai@cs.fau.de

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F . Lai 16/16