Advanced Search
Volume 42 Issue 5
Jun.  2020
Turn off MathJax
Article Contents
Jinhua MA, Xinyi HUANG, Junpeng XU, Wei WU. Public Accountable Redactable Signature Scheme[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1079-1086. doi: 10.11999/JEIT190836
Citation: Jinhua MA, Xinyi HUANG, Junpeng XU, Wei WU. Public Accountable Redactable Signature Scheme[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1079-1086. doi: 10.11999/JEIT190836

Public Accountable Redactable Signature Scheme

doi: 10.11999/JEIT190836
Funds:  The National Natural Science Foundation of China (61822202, 61872089, 61872090)
  • Received Date: 2019-10-29
  • Rev Recd Date: 2020-02-08
  • Available Online: 2020-03-19
  • Publish Date: 2020-06-04
  • Redactable Signature Scheme (RSS) with accountability allows a redactor to delete some portions of the signed data, and generates a valid signature for the remained data without any interaction with the original signer. It supports to trace the data producer, and is an effective solution to the malicious redaction problem of RSS. A novel design of Public Accountable Redactable Signature Scheme (PA-RSS) is proposed, and its security model is formally defined. The first concrete design of PA-RSS is presented by using the traditional digital signature scheme, which can add public accountability to any RSS without accountability. Its unforgeability, privacy, signer's public accountability, and redactor's public accountability are proved. Compared with the existing public accountable RSS, the presented scheme with less communication cost is more efficient, and much more applicable to realize the public accountability of authenticated data redaction in an open and sharable environment.
  • loading
  • GOLDWASSER S, MICALI S, and RIVEST R L. A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal on Computing, 1988, 17(2): 281–308. doi: 10.1137/0217017
    JOHNSON R, MOLNAR D, SONG D, et al. Homomorphic signature schemes[C]. Cryptographers’ Track at the RSA Conference, San Jose, USA, 2002: 244–262. doi: 10.1007/3-540-45760-7_17.
    STEINFELD R, BULL L, and ZHENG Yuliang. Content extraction signatures[C]. The 4th International Conference on Information Security and Cryptology, Seoul, Korea, 2001: 285–304. doi: 10.1007/3-540-45861-1_22.
    MIYAZAKI K, IWAMURA M, MATSUMOTO T, et al. Digitally signed document sanitizing scheme with disclosure condition control[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005, E88-A(1): 239–246. doi: 10.1093/ietfec/e88-a.1.239
    MA Jinhua, LIU Jianghua, WANG Min, et al. An efficient and secure design of redactable signature scheme with redaction condition control[C]. The 12th International Conference on Green, Pervasive, and Cloud Computing, Cetara, Italy, 2017: 38–52. doi: 10.1007/978-3-319-57186-7_4.
    MIYAZAKI K, HANAOKA G, and IMAI H. Digitally signed document sanitizing scheme based on bilinear maps[C]. The 2006 ACM Symposium on Information, Computer and Communications Security, Taipei, China, 2006: 343–354. doi: 10.1145/1128817.1128868.
    BULL L, SQUIRE D M G, and ZHENG Yuliang. A hierarchical extraction policy for content extraction signatures: Selectively handling verifiable digital content[J]. International Journal on Digital Libraries, 2004, 4(3): 208–222. doi: 10.1007/s00799-004-0082-z
    MA Jinhua, LIU Jianghua, HUANG Xinyi, et al. Authenticated data redaction with fine-grained control[J]. IEEE Transactions on Emerging Topics in Computing, To be published. doi: 10.1109/TETC.2017.2754646
    LIU Jianghua, MA Jinhua, XIANG Yang, et al. Authenticated medical documents releasing with privacy protection and release control[J]. IEEE Transactions on Dependable and Secure Computing, To be published. doi: 10.1109/TDSC.2019.2892446
    SAMELIN K, PÖHLS H C, BILZHAUSE A, et al. Redactable signatures for independent removal of structure and content[C]. The 8th International Conference on Information Security Practice and Experience, Hangzhou, China, 2012: 17–33. doi: 10.1007/978-3-642-29101-2_2.
    DE MEER H, PÖHLS H C, POSEGGA J, et al. Redactable signature schemes for trees with signer-controlled non-leaf-redactions[C]. International Conference on E-Business and Telecommunications. Berlin, Germany, 2012: 155–171. doi: 10.1007/978-3-662-44791-8_10.
    SAMELIN K, PÖHLS H C, BILZHAUSE A, et al. On structural signatures for tree data structures[C]. The 10th International Conference on Applied Cryptography and Network Security, Singapore, 2012: 171–187. doi: 10.1007/978-3-642-31284-7_11.
    DE MEER H, PÖHLS H C, POSEGGA J, et al. On the relation between redactable and sanitizable signature schemes[C]. The 6th International Symposium on Engineering Secure Software and Systems, Munich, Germany, 2014: 113–130. doi: 10.1007/978-3-319-04897-0_8.
    PÖHLS H C and SAMELIN K. Accountable redactable signatures[C]. The 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 2015: 60–69. doi: 10.1109/ARES.2015.10.
    BRZUSKA C, FISCHLIN M, FREUDENREICH T, et al. Security of sanitizable signatures revisited[C]. The 12th International Workshop on Public Key Cryptography, Irvine, USA, 2009: 317–336. doi: 10.1007/978-3-642-00468-1_18.
    马金花, 刘江华, 伍玮, 等. 可修订数字签名研究综述[J]. 计算机研究与发展, 2017, 54(10): 2144–2152. doi: 10.7544/issn1000-1239.2017.20170646

    MA Jinhua, LIU Jianghua, WU Wei, et al. Survey on redactable signatures[J]. Journal of Computer Research and Development, 2017, 54(10): 2144–2152. doi: 10.7544/issn1000-1239.2017.20170646
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3106) PDF downloads(96) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return