Multi‐key homomorphic authenticators
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m1, …,mt andoutsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generatea short authenticator σf , y vouching for the correctness of the output y of a function f computed on the outsourced data, i.e.y = f (m1, …,mt). The notion of
