Abstract
The signature schemes presented in Chap. 4 are discussed from an abstract and very general point of view. In this chapter the requirements a scheme needs to provide to be applied for a certain application will be highlighted. Specifically, in this section electronic voting, smart grids, and electronic health records are discussed. Each of the following sections is dedicated to one of them. After a brief description of the use case in question, the requirements for a homomorphic signature scheme are discussed, the state of the art is presented, and possible future work is highlighted.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Adida B, Rivest RL (2006) Scratch & vote: self-contained paper-based cryptographic voting. In: Proceedings of the 5th ACM workshop on privacy in electronic society. ACM, New York, pp 29–40
Blumenthal D, Tavenner M (2010) The “meaningful use” regulation for electronic health records. N Engl J Med 363(6):501–504
Chaum D, Essex A, Carback R, Clark J, Popoveniuc S, Sherman A, Vora P (2008) Scantegrity: end-to-end voter-verifiable optical-scan voting. IEEE Secur Priv 6(3):40–46
Cortier V, Fuchsbauer G, Galindo D (2015) Beleniosrf: a strongly receipt-free electronic voting scheme. IACR Cryptology ePrint Archive, 2015:629
El Gamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology, proceedings of CRYPTO’84, Santa Barbara, CA, August 19–22, 1984, proceedings, pp 10–18
Kalra D, Ingram D (2006) Electronic health records. In: Information technology solutions for healthcare. Springer, Berlin, pp 135–181
Li F, Luo B (2012) Preserving data integrity for smart grid data aggregation. In: 2012 IEEE third international conference on smart grid communications (SmartGridComm). IEEE, New York, pp 366–371
Makri E, Everts MH, Hoogh S, Peter A, Akker H, Hartel P, Jonker W (2014) Privacy-preserving verification of clinical research
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology - EUROCRYPT’99, international conference on the theory and application of cryptographic techniques, Prague, May 2–6, 1999, proceeding, pp 223–238
Park C, Itoh K, Kurosawa K (1993) Efficient anonymous channel and all/nothing election scheme. In: Advances in cryptology - EUROCRYPT’93, workshop on the theory and application of cryptographic techniques, Lofthus, May 23–27, 1993, proceedings, pp 248–259
Robertson A, Cresswell K, Takian A, Petrakaki D, Crowe S, Cornford T, Barber N, Avery A, Fernando B, Jacklin A et al (2010) Implementation and adoption of nationwide electronic health records in secondary care in England: qualitative analysis of interim results from a prospective national evaluation. BMJ 341
Xia Z, Culnane C, Heather J, Jonker H, Ryan PY, Schneider S, Srinivasan S (2010) Versatile prêt à voter: handling multiple election methods with a unified interface. In: Progress in cryptology-INDOCRYPT 2010. Springer, Berlin, pp 98–114
Yang L, Li F (2013) Detecting false data injection in smart grid in-network aggregation. In: 2013 IEEE international conference on smart grid communications (SmartGridComm). IEEE, New York, pp 408–413
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Traverso, G., Demirel, D., Buchmann, J. (2016). Suitable Homomorphic Signature Schemes for eVoting, Smart Grids, and eHealth. In: Homomorphic Signature Schemes. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-32115-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-32115-8_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32114-1
Online ISBN: 978-3-319-32115-8
eBook Packages: Computer ScienceComputer Science (R0)