Data Authentication with Privacy Protection

Digital signatures, with the properties of data integrity and authenticity authentication, protect a signed message from any alteration. However, appropriate alteration of signed message should be allowed for the purposes of privacy protection in some scenarios, such as medical data sharing, outsourced databases, etc. Redactable signatures, a branch of homomorphic signatures for editing, allow any party to delete some submessage blocks from a signed message and generate a valid signature on the remaining message without any help of the original signer. This chapter provides a basic introduction on the state-of-the-art redactable signature schemes. We mainly consider the redaction control problem of redactable signature schemes in different applications. We also present three integrated solutions, which hopefully offer more insights into this crucial problem.

[1]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[2]  Joseph K. Liu,et al.  Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..

[3]  Birgit Pfitzmann,et al.  Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.

[4]  Daniel Slamanig,et al.  A General Framework for Redactable Signatures and New Constructions , 2015, ICISC.

[5]  Henrich Christopher Pöhls,et al.  Accountable Redactable Signatures , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[6]  Douglas M. Blough,et al.  Redactable signatures on data with dependencies and their application to personal health records , 2009, WPES '09.

[7]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[8]  Shoichi Hirose,et al.  Redactable signature scheme for tree-structured data based on Merkle tree , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[9]  Yasuo Hatano,et al.  Efficient signature schemes supporting redaction, pseudonymization, and data deidentification , 2008, ASIACCS '08.

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[11]  Joachim Posegga,et al.  Length-Hiding Redactable Signatures from One-Way Accumulators in O(n) , 2013 .

[12]  Elisa Bertino,et al.  Privacy-preserving authentication of trees and graphs , 2013, International Journal of Information Security.

[13]  Daniel Slamanig,et al.  Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare , 2010, Communications and Multimedia Security.

[14]  Douglas M. Blough,et al.  Verifiable and Redactable Medical Documents , 2012, AMIA.

[15]  Wei Wu,et al.  An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control , 2017, GPC.

[16]  Hideki Imai,et al.  Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[17]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[18]  Hideki Imai,et al.  Digitally signed document sanitizing scheme based on bilinear maps , 2006, ASIACCS '06.

[19]  Christian Hanser,et al.  Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives , 2015, IACR Cryptol. ePrint Arch..

[20]  S. Micali,et al.  How To Construct Randolli Functions , 1984, FOCS 1984.

[21]  Josh Benaloh,et al.  One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.

[22]  Nobuo Funabiki,et al.  Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System , 2011, PETS.

[23]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[24]  Daniel Slamanig,et al.  Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing , 2016, CANS.

[25]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[26]  Li Xu,et al.  Protecting Mobile Health Records in Cloud Computing , 2017, ACM Trans. Embed. Comput. Syst..

[27]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[28]  Henrich Christopher Pöhls,et al.  On Updatable Redactable Signatures , 2014, ACNS.

[29]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[30]  Ron Steinfeld,et al.  Content Extraction Signatures , 2001, ICISC.

[31]  Joachim Posegga,et al.  Redactable Signatures for Independent Removal of Structure and Content , 2012, ISPEC.

[32]  Stefan Katzenbeisser,et al.  Redactable Signatures for Tree-Structured Data: Definitions and Constructions , 2010, ACNS.

[33]  Yuliang Zheng,et al.  A Hierarchical Extraction Policy for content extraction signatures , 2004, International Journal on Digital Libraries.

[34]  Yu-Fang Chung,et al.  Redactable Signatures for Signed CDA Documents , 2012, Journal of Medical Systems.

[35]  Jia Xu,et al.  Short Redactable Signatures Using Random Trees , 2009, CT-RSA.

[36]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[37]  Yuliang Zheng,et al.  Grouping Verifiable Content for Selective Disclosure , 2003, ACISP.