Linearly Homomorphic Signatures from Lattices

2020 ◽  
Vol 63 (12) ◽  
pp. 1871-1885
Author(s):  
Cheng-Jun Lin ◽  
Rui Xue ◽  
Shao-Jun Yang ◽  
Xinyi Huang ◽  
Shimin Li

Abstract Linearly homomorphic signatures (LHSs) allow any entity to linearly combine a set of signatures and to provide authentication service for the corresponding (combined) data. The public key of the current known LHSs from lattices in the standard model requires $O(l)$ matrices and $O(k)$ vectors, where $l$ is the length of file identifier and $k$ is the maximum data set size that linear functions support. In this paper, we construct two lattice-based LHS schemes with provable security in the standard model and both schemes can authenticate vectors defined over finite field. First, we present a basic LHS scheme satisfying selective security, based on the full-rank difference hash functions. Second, we modify the chameleon hash function constructed by (Cash, D., Hofheinz, D., Kiltz, E. and Peikert, C. (2010) Bonsai Trees, or How to Delegate a Lattice Basis. In Proc. EUROCRYPT 10, Monaco/French Riviera, May 30 to June 3, pp. 523–552. Springer, Berlin) to construct a linearly homomorphic chameleon hash function (LHCHF), which can be applied to all transformations from selectively secure LHS scheme that authenticates vectors defined over finite field $\mathbb{F}_{p}$ ($p=poly(n)$) to fully secure one, except for a new one that authenticates vectors defined over a small field. Starting from LHCFH and the basic scheme as above, we obtain a fully secure LHS scheme. Both schemes can be used to sign multiple files and have relatively short public keys consisting of $O(1)$ matrices and $O(k)$ vectors.

2012 ◽  
Vol 109 (11) ◽  
Author(s):  
T. Aaltonen ◽  
B. Álvarez González ◽  
S. Amerio ◽  
D. Amidei ◽  
A. Anastassov ◽  
...  

2015 ◽  
Vol 8 (3) ◽  
Author(s):  
Shelley A. Page

The weak charge of the proton has been determined for the first time via a high precision electron-proton scattering experiment, Qweak, carried out at Jefferson Laboratory (JLab) in Newport News, USA. The weak charge is a basic property in subatomic physics, analogous to electric charge. The Standard Model makes a prediction for the weak charges of protons and other particles. First results described here are based on an initial 4% of the data set reported in 20131, with the ultimate goal of the experiment being a high precision Standard Model test conducted with the full Qweak data set. These initial results are consistent with the Standard Model prediction; they serve as an important first determination of the proton’s weak charge and a proof of principle that the ultimate goals are within reach.


2021 ◽  
Vol 81 (8) ◽  
Author(s):  
B. C. Allanach ◽  
J. Eliel Camargo-Molina ◽  
Joe Davighi

AbstractWhile it is known that third family hypercharge models can explain the neutral current B-anomalies, it was hitherto unclear whether the $$Z-Z^\prime $$ Z - Z ′ mixing predicted by such models could simultaneously fit electroweak precision observables. Here, we perform global fits of several third family hypercharge models to a combination of electroweak data and those data pertinent to the neutral current B-anomalies. While the Standard Model is in tension with this combined data set with a p-value of .0007, simple versions of the models (fitting two additional parameters each) provide much improved fits. The original Third Family Hypercharge Model, for example, has a p-value of $${.065}$$ . 065 , with $$\sqrt{\Delta \chi ^2}=6.5\sigma $$ Δ χ 2 = 6.5 σ .


2021 ◽  
pp. 1-36
Author(s):  
Dario Catalano ◽  
Georg Fuchsbauer ◽  
Azam Soleimanian

A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty is the disclosure of the signer’s signing key. Most of the existing DAPS schemes are proved secure in the random oracle model (ROM), while the efficient ones in the standard model only support address spaces of polynomial size. We present DAPS schemes that are efficient, secure in the standard model under standard assumptions and support large address spaces. Our main construction builds on vector commitments (VC) and double-trapdoor chameleon hash functions (DCH). We also provide a DAPS realization from Groth–Sahai (GS) proofs that builds on a generic construction by Derler et al., which they instantiate in the ROM. The GS-based construction, while less efficient than our main one, shows that a general yet efficient instantiation of DAPS in the standard model is possible. An interesting feature of our main construction is that it can be easily modified to guarantee security even in the most challenging setting where no trusted setup is provided. To the best of our knowledge, ours seems to be the first construction achieving this in the standard model.


2020 ◽  
Vol 2020 (11) ◽  
Author(s):  
E. Cortina Gil ◽  
◽  
A. Kleimenova ◽  
E. Minucci ◽  
S. Padolski ◽  
...  

Abstract The NA62 experiment reports an investigation of the $$ {K}^{+}\to {\pi}^{+}\nu \overline{\nu} $$ K + → π + ν ν ¯ mode from a sample of K+ decays collected in 2017 at the CERN SPS. The experiment has achieved a single event sensitivity of (0.389 ± 0.024) × 10−10, corresponding to 2.2 events assuming the Standard Model branching ratio of (8.4 ± 1.0) × 10−11. Two signal candidates are observed with an expected background of 1.5 events. Combined with the result of a similar analysis conducted by NA62 on a smaller data set recorded in 2016, the collaboration now reports an upper limit of 1.78 × 10−10 for the $$ {K}^{+}\to {\pi}^{+}\nu \overline{\nu} $$ K + → π + ν ν ¯ branching ratio at 90% CL. This, together with the corresponding 68% CL measurement of ($$ {0.48}_{-0.48}^{+0.72} $$ 0.48 − 0.48 + 0.72 ) × 10−10, are currently the most precise results worldwide, and are able to constrain some New Physics models that predict large enhancements still allowed by previous measurements.


2021 ◽  
Vol 81 (7) ◽  
Author(s):  
◽  
A. M. Sirunyan ◽  
A. Tumasyan ◽  
W. Adam ◽  
F. Ambrogi ◽  
...  

AbstractResults of the Model Unspecific Search in CMS (MUSiC), using proton–proton collision data recorded at the LHC at a centre-of-mass energy of 13$$\,\text {TeV}$$ TeV , corresponding to an integrated luminosity of 35.9$$\,\text {fb}^{-1}$$ fb - 1 , are presented. The MUSiC analysis searches for anomalies that could be signatures of physics beyond the standard model. The analysis is based on the comparison of observed data with the standard model prediction, as determined from simulation, in several hundred final states and multiple kinematic distributions. Events containing at least one electron or muon are classified based on their final state topology, and an automated search algorithm surveys the observed data for deviations from the prediction. The sensitivity of the search is validated using multiple methods. No significant deviations from the predictions have been observed. For a wide range of final state topologies, agreement is found between the data and the standard model simulation. This analysis complements dedicated search analyses by significantly expanding the range of final states covered using a model independent approach with the largest data set to date to probe phase space regions beyond the reach of previous general searches.


Sign in / Sign up

Export Citation Format

Share Document