Paper 2024/2073

Succinct Homomorphic MACs from Groups and Applications

Yuval Ishai, Technion – Israel Institute of Technology
Hanjun Li, University of Washington
Huijia Lin, University of Washington
Abstract

Homomorphic message authentication codes (HMACs) allow users to authenticate data using a shared secret key, while supporting computation over authenticated data. Given data and their tags , anyone can evaluate a circuit on the data and tags to produce a succinct tag authenticating the output . Importantly, tags remain succinc -- of size polynomial in the security parameter -- regardless of the size of . This work introduces an enhanced variant of HMACs called algebraic HMAC (aHMAC), in which all tags (input and output) take the form , as in standard information-theoretic MACs. We construct an aHMAC from group-based assumptions, including variants of the DDH and DCR assumptions, and use it to obtain group-based constructions of several cryptographic primitives: - Succinct CDS for circuits. For any represented by circuit, we obtain a Conditional Disclosure of Secrets protocol with poly communication. - Succinct PSM for simple programs. For any represented by a truth-table or shallow branching program, we obtain a Private Simultaneous Messages protocol or a garbling scheme with poly communication. - Constrained PRFs for circuits. We obtain the first group-based constrained pseudorandom functions for general circuits, improving over a previous construction for NC1 circuits. Prior to our work, these applications could only be obtained from lattice assumptions or indistinguishability obfuscation.

Note: April, 21, 2025: - changed titile (from "Succinct Partial Garbling from Groups and Applications"); - revised leveled constructions based on DDH instead of P-DDH in Sec. 3.4; - added connections between aHMAC and standard HMAC in Sec. 3.5; - added lattice constructions for aHMAC in Sec. A;

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
garbled circuitssecure computationconstrained pseudorandom function
Contact author(s)
yuvali @ cs technion ac il
hanjul @ cs washington edu
rachel @ cs washington edu
History
2025-04-22: revised
2024-12-24: received
See all versions
Short URL
https://ia.cr/2024/2073
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/2073,
      author = {Yuval Ishai and Hanjun Li and Huijia Lin},
      title = {Succinct Homomorphic {MACs} from Groups and Applications},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/2073},
      year = {2024},
      url = {https://eprint.iacr.org/2024/2073}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.