ABSTRACT
Redactable signatures for linear-structured data such as strings have already been studied in the literature. In this paper, we propose a formal security model for leakage-free redactable signatures (LFRS) that is general enough to address authentication of not only trees but also graphs and forests. LFRS schemes have several applications, especially in enabling secure data management in the emerging cloud computing paradigm as well as in healthcare, finance and biological applications. We have also formally defined the notion of secure names. Such secure names facilitate leakage-free verification of ordering between siblings/nodes. The paper also proposes a construction for secure names, and a construction for leakagefree redactable signatures based on the secure naming scheme. The proposed construction computes a linear number of signatures with respect to the size of the data object, and outputs only one signature that is stored, transmitted and used for authentication of any tree, graph and forest.
- G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik. Sanitizable signatures. In ESORICS, pages 159--177, 2005. Google ScholarDigital Library
- Mihir Bellare, Juan A. Garay, and Tal Rabin. Fast batch verification for modular exponentiation and digital signatures. In EUROCRYPT, 1998.Google ScholarCross Ref
- C. Brzuska, H. Busch, Ö. Dagdelen, M. Fischlin, M. Franz, S. Katzenbeisser, M. Manulis, C. Onete, A. Peter, B. Poettering, and D. Schröder. Redactable signatures for tree-structured data: Definitions and constructions. In ACNS, 2010. Google ScholarDigital Library
- Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schröder. Unlinkability of sanitizable signatures. In Public Key Cryptography, 2010. Google ScholarDigital Library
- A. Buldas and S. Laur. Knowledge-binding commitments with applications in time-stamping. In Public Key Cryptography, pages 150--165, 2007. Google ScholarDigital Library
- L. Bull, P. Stanski, and D. McG. Squire. Content extraction signatures using xml digital signatures and custom transforms on-demand. In WWW, 2003. Google ScholarDigital Library
- Danielh. Chou, Breno De Medeiros, and Gene Tsudik. Sanitizable signatures. In ESORICS, 2005.Google Scholar
- S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17(2), 1988. Google ScholarDigital Library
- S. Haber, Y. Hatano, Y. Honda, W. Horne, K. Miyazaki, T. Sander, S. Tezoku, and D. Yao. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In ASIACCS, 2008. Google ScholarDigital Library
- R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. In In CT-RSA, 2002. Google ScholarDigital Library
- J. Katz and Y. Lindell. Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, 2007. Google ScholarDigital Library
- A. Kundu and E. Bertino. Structural signatures for tree data structures. In VLDB, 2008. Google ScholarDigital Library
- A. Kundu and E. Bertino. How to authenticate graphs without leaking. In EDBT, 2010. Google ScholarDigital Library
- R. C. Merkle. A certified digital signature. In CRYPTO, 1989. Google ScholarDigital Library
- K. Miyazaki, G. Hanaoka, and H. Imai. Digitally signed document sanitizing scheme based on bilinear maps. In ASIACCS, 2006. Google ScholarDigital Library
- E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. ACM Trans. of Storage, 2(2):107--138, 2006. Google ScholarDigital Library
- R. Rivest. "two new signature schemes", presented at cambridge seminar, 2001.Google Scholar
Index Terms
- Leakage-free redactable signatures
Recommendations
RCB: leakage-resilient authenticated encryption via re-keying
The security of modern cryptosystems relies on the secrecy of the keys. Against the expectation that the keys used in cryptographic algorithms are perfectly secure, the keys can get compromised when implemented on physical devices. Because of the ...
Redactable signatures for independent removal of structure and content
ISPEC'12: Proceedings of the 8th international conference on Information Security Practice and ExperienceIn this paper, we present a provably secure redactable signature scheme allowing to independently redact structure and content. We identify the problems when structure is not separated from content, resulting in an attack on the scheme proposed at VLDB '...
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
DBSec 2014: Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this delegated set on behalf of the originator. Recently, two ...
Comments