Abstract
Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for trees which support public redaction of subtrees (by third-party distributors) while pertaining the integrity of the remaining parts. An example is given by signed XML documents of which parts should be sanitized before being published by a distributor not holding the signing key. Kundu and Bertino also provide a construction, but fall short of providing formal security definitions and proofs. Here we revisit their work and give rigorous security models for the redactable signatures for tree-structured data, relate the notions, and give a construction that can be proven secure under standard cryptographic assumptions.
| Original language | English |
|---|---|
| Title of host publication | APPLIED CRYPTOGRAPHY AND NETWORK SECURITY |
| Editors | J Zhou, M Yung |
| Publisher | Springer |
| Pages | 87-104 |
| Number of pages | 18 |
| ISBN (Print) | 978-3-642-13707-5 |
| Publication status | Published - 2010 |
| MoE publication type | A4 Conference publication |
| Event | International Conference on Applied Cryptography and Network Security - Beijing, China Duration: 22 Jun 2010 → 25 Jun 2010 Conference number: 8 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | SPRINGER-VERLAG BERLIN |
| Volume | 6123 |
| ISSN (Print) | 0302-9743 |
Conference
| Conference | International Conference on Applied Cryptography and Network Security |
|---|---|
| Abbreviated title | ACNS |
| Country/Territory | China |
| City | Beijing |
| Period | 22/06/2010 → 25/06/2010 |