Homomorphic Signature Schemes Homomorphic Signature Schemes
SpringerBriefs in Computer Science

Homomorphic Signature Schemes

A Survey

Giulia Traverso and Others
    • €42.99
    • €42.99

Publisher Description

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

GENRE
Computing & Internet
RELEASED
2016
21 April
LANGUAGE
EN
English
LENGTH
75
Pages
PUBLISHER
Springer International Publishing
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
1.4
MB
Public-Key Cryptography – PKC 2016 Public-Key Cryptography – PKC 2016
2016
Information Security and Cryptology Information Security and Cryptology
2009
Provable Security Provable Security
2017
Security and Cryptography for Networks Security and Cryptography for Networks
2008
Applied Cryptography and Network Security Applied Cryptography and Network Security
2010
Advances in Information and Computer Security Advances in Information and Computer Security
2008
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Digital Image Forgery Detection Digital Image Forgery Detection
2025
Blockchain Without Barriers Blockchain Without Barriers
2025
Human Reconstruction Using mmWave Technology Human Reconstruction Using mmWave Technology
2025