Abstrakti
Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for trees which support public redaction of subtrees (by third-party distributors) while pertaining the integrity of the remaining parts. An example is given by signed XML documents of which parts should be sanitized before being published by a distributor not holding the signing key. Kundu and Bertino also provide a construction, but fall short of providing formal security definitions and proofs. Here we revisit their work and give rigorous security models for the redactable signatures for tree-structured data, relate the notions, and give a construction that can be proven secure under standard cryptographic assumptions.
| Alkuperäiskieli | Englanti |
|---|---|
| Otsikko | APPLIED CRYPTOGRAPHY AND NETWORK SECURITY |
| Toimittajat | J Zhou, M Yung |
| Kustantaja | Springer |
| Sivut | 87-104 |
| Sivumäärä | 18 |
| ISBN (painettu) | 978-3-642-13707-5 |
| Tila | Julkaistu - 2010 |
| OKM-julkaisutyyppi | A4 Artikkeli konferenssijulkaisussa |
| Tapahtuma | International Conference on Applied Cryptography and Network Security - Beijing, Kiina Kesto: 22 kesäk. 2010 → 25 kesäk. 2010 Konferenssinumero: 8 |
Julkaisusarja
| Nimi | Lecture Notes in Computer Science |
|---|---|
| Kustantaja | SPRINGER-VERLAG BERLIN |
| Vuosikerta | 6123 |
| ISSN (painettu) | 0302-9743 |
Conference
| Conference | International Conference on Applied Cryptography and Network Security |
|---|---|
| Lyhennettä | ACNS |
| Maa/Alue | Kiina |
| Kaupunki | Beijing |
| Ajanjakso | 22/06/2010 → 25/06/2010 |