Skip to main content
Top

2017 | OriginalPaper | Chapter

An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control

Authors : Jinhua Ma, Jianghua Liu, Min Wang, Wei Wu

Published in: Green, Pervasive, and Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital signatures, with the properties of data integrity and authenticity authentication, protect a signed message from any alteration. However, appropriate alteration of signed message should be allowed for the purposes of privacy protection or bandwidth saving in some scenarios, such as medical record or official information disclosure. Redactable signatures, a branch of homomorphic signatures for editing, allow any redactor to remove some submessage blocks from an originally signed message and generate a valid signature on the modified message without any help of the original signer. In this paper, we present a new design of redactable signature scheme with submessage redaction control structure. This scheme has the security properties of unforgeability, privacy, and transparency, which are formally defined and proved. Compared with state-of-the-art redactable signature schemes, our scheme is more efficient in communication and computation cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)MathSciNetCrossRefMATH Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)MathSciNetCrossRefMATH
3.
go back to reference Miyazaki, K., Susaki, S., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H.: Digital documents sanitizing problem. Inst. Electron. Inf. Commun. Eng. Tech. Rep. 103(195), 61–67 (2003) Miyazaki, K., Susaki, S., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H.: Digital documents sanitizing problem. Inst. Electron. Inf. Commun. Eng. Tech. Rep. 103(195), 61–67 (2003)
6.
go back to reference Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum, Technical report (2008) Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum, Technical report (2008)
8.
go back to reference Derler, D., Hanser, C., Slamanig, D.: Revisiting cryptographic accumulators, additional properties and relations to other primitives. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 127–144. Springer, Cham (2015). doi:10.1007/978-3-319-16715-2_7 Derler, D., Hanser, C., Slamanig, D.: Revisiting cryptographic accumulators, additional properties and relations to other primitives. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 127–144. Springer, Cham (2015). doi:10.​1007/​978-3-319-16715-2_​7
10.
go back to reference Ateniese, G., Chou, D.H., Medeiros, B., Tsudik, G.: Sanitizable signatures. In: Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005). doi:10.1007/11555827_10 CrossRef Ateniese, G., Chou, D.H., Medeiros, B., Tsudik, G.: Sanitizable signatures. In: Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005). doi:10.​1007/​11555827_​10 CrossRef
11.
go back to reference Miyazaki, K., Iwamura, M., Matsumoto, T., et al.: Digitally signed document sanitizing scheme with disclosure condition control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(1), 239–246 (2005)CrossRef Miyazaki, K., Iwamura, M., Matsumoto, T., et al.: Digitally signed document sanitizing scheme with disclosure condition control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(1), 239–246 (2005)CrossRef
12.
go back to reference Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 343–354. ACM (2006) Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 343–354. ACM (2006)
13.
go back to reference Pohls, H.C., Samelin, K., Posegga, J., et al.: Length-hiding redactable signatures from one-way accumulators in O(n). Technical report MIP-1201, Faculty of Computer Science and Mathematics (FIM), University of Passau (2012) Pohls, H.C., Samelin, K., Posegga, J., et al.: Length-hiding redactable signatures from one-way accumulators in O(n). Technical report MIP-1201, Faculty of Computer Science and Mathematics (FIM), University of Passau (2012)
14.
go back to reference Derler, D., Pöhls, H.C., Samelin, K., Slamanig, D.: A general framework for redactable signatures and new constructions. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 3–19. Springer, Cham (2016). doi:10.1007/978-3-319-30840-1_1 CrossRef Derler, D., Pöhls, H.C., Samelin, K., Slamanig, D.: A general framework for redactable signatures and new constructions. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 3–19. Springer, Cham (2016). doi:10.​1007/​978-3-319-30840-1_​1 CrossRef
16.
go back to reference Brzuska, C., et al.: Redactable signatures for tree-structured data: definitions and constructions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 87–104. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13708-2_6 CrossRef Brzuska, C., et al.: Redactable signatures for tree-structured data: definitions and constructions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 87–104. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-13708-2_​6 CrossRef
17.
go back to reference Kundu, A., Bertino, E.: How to authenticate graphs without leaking. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 609–620. ACM (2010) Kundu, A., Bertino, E.: How to authenticate graphs without leaking. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 609–620. ACM (2010)
18.
go back to reference Kundu, A., Bertino, E.: Privacy-preserving authentication of trees and graphs. Int. J. Inf. Secur. 12(6), 467–494 (2013)CrossRef Kundu, A., Bertino, E.: Privacy-preserving authentication of trees and graphs. Int. J. Inf. Secur. 12(6), 467–494 (2013)CrossRef
19.
go back to reference Meer, H., Pöhls, H.C., Posegga, J., Samelin, K.: On the relation between redactable and sanitizable signature schemes. In: Jürjens, J., Piessens, F., Bielova, N. (eds.) ESSoS 2014. LNCS, vol. 8364, pp. 113–130. Springer, Cham (2014). doi:10.1007/978-3-319-04897-0_8 CrossRef Meer, H., Pöhls, H.C., Posegga, J., Samelin, K.: On the relation between redactable and sanitizable signature schemes. In: Jürjens, J., Piessens, F., Bielova, N. (eds.) ESSoS 2014. LNCS, vol. 8364, pp. 113–130. Springer, Cham (2014). doi:10.​1007/​978-3-319-04897-0_​8 CrossRef
20.
go back to reference Slamanig, D., Derler, D., Hanser, C., et al. (TUG): Overview of Functional and Malleable Signature Schemes (2015) Slamanig, D., Derler, D., Hanser, C., et al. (TUG): Overview of Functional and Malleable Signature Schemes (2015)
22.
go back to reference Eastlake 3rd, D., Jones, P.: US secure hash algorithm 1 (SHA1) (2001) Eastlake 3rd, D., Jones, P.: US secure hash algorithm 1 (SHA1) (2001)
23.
go back to reference Dang, Q.H.: Secure hash standard. National Institute of Standards and Technology, Gaithersburg, MD, Technical report, August 2015 Dang, Q.H.: Secure hash standard. National Institute of Standards and Technology, Gaithersburg, MD, Technical report, August 2015
24.
go back to reference Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993)
25.
go back to reference Benaloh, J., Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994). doi:10.1007/3-540-48285-7_24 Benaloh, J., Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994). doi:10.​1007/​3-540-48285-7_​24
26.
go back to reference Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997). doi:10.1007/3-540-69053-0_33 Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997). doi:10.​1007/​3-540-69053-0_​33
Metadata
Title
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control
Authors
Jinhua Ma
Jianghua Liu
Min Wang
Wei Wu
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-57186-7_4

Premium Partner