TY - GEN
T1 - Commitment Based Identity-Based Homomorphic Signatures for E-Document
AU - Vangujar, Apurva Kiran
AU - Ganesh, Buvana
AU - Palmieri, Paolo
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - Multi-key Homomorphic Signatures (HS) preserve the integrity of data during computations over private inputs from multiple parties. This paper introduces module variants of the Shortest Integer Solution (MSIS)-based Commitment Identity-based Homomorphic Signatures (CIBHS) to address the growing need for secure, efficient, and scalable HS for e-documents. Our proposed CIBHS scheme enables the verification of signatures from multiple identities (A, B, C) without accessing the original data, ensuring homomorphism in keys and messages. This promotes confidentiality and collaboration in e-document environments. The scheme streamlines transaction verification by allowing efficient combined signature validation without revealing individual inputs. The construction of the CIBHS framework is built upon Buvana et al. [1] and includes three phases: Registration, Form Completion, and Verification executed through seven key algorithms: KeyGen, KeyExt, Commit, Sign, Open, Eval, and Verify. These contributions significantly advance signature schemes, providing practical and robust solutions for maintaining data integrity and confidentiality in collaborative e-document workflows.
AB - Multi-key Homomorphic Signatures (HS) preserve the integrity of data during computations over private inputs from multiple parties. This paper introduces module variants of the Shortest Integer Solution (MSIS)-based Commitment Identity-based Homomorphic Signatures (CIBHS) to address the growing need for secure, efficient, and scalable HS for e-documents. Our proposed CIBHS scheme enables the verification of signatures from multiple identities (A, B, C) without accessing the original data, ensuring homomorphism in keys and messages. This promotes confidentiality and collaboration in e-document environments. The scheme streamlines transaction verification by allowing efficient combined signature validation without revealing individual inputs. The construction of the CIBHS framework is built upon Buvana et al. [1] and includes three phases: Registration, Form Completion, and Verification executed through seven key algorithms: KeyGen, KeyExt, Commit, Sign, Open, Eval, and Verify. These contributions significantly advance signature schemes, providing practical and robust solutions for maintaining data integrity and confidentiality in collaborative e-document workflows.
KW - Commitment Scheme
KW - E-document
KW - Homomorphic Signatures
KW - Identity-based Signatures
UR - https://www.scopus.com/pages/publications/105016783687
U2 - 10.1109/CSP66295.2025.00034
DO - 10.1109/CSP66295.2025.00034
M3 - Conference proceeding
AN - SCOPUS:105016783687
T3 - Proceedings - 2025 9th International Conference on Cryptography, Security and Privacy, CSP 2025
SP - 163
EP - 168
BT - Proceedings - 2025 9th International Conference on Cryptography, Security and Privacy, CSP 2025
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th International Conference on Cryptography, Security and Privacy, CSP 2025
Y2 - 26 April 2025 through 28 April 2025
ER -