Survey on redactable signatures
Version 2 2024-06-06, 09:46Version 2 2024-06-06, 09:46
Version 1 2017-10-01, 00:00Version 1 2017-10-01, 00:00
journal contribution
posted on 2024-06-06, 09:46 authored by J Ma, J Liu, W Wu, X Huang© 2017, Science Press. All right reserved. Data security issues have become a serious challenge to national economic, political, defence and cultural security. As a core technology in protecting data security, digital signatures have been widely used for the verification of data integrity and source authenticity. The security definition of conventional digital signatures is existentially unforgeable against adaptive chosen-message attacks. Although it meets the basic security requirement of data authentication, it hampers the reasonable operation of authenticated data which is desirable in many practical applications. As a type of malleable homomorphic signatures for editing, redactable signatures allow the signature holder (redactor) to delete sensitive portions of the signed data and generate a valid signature for the disclosed data without any help from the original signer. It has been a research hotspot in the field of cryptography since it was introduced in 2001. In recent years, many researchers have studied redactable signatures from the aspects of formal security definition, redaction control mechanism, computational cost and communication overhead, and there are lots of research results. However, the rapid development of network technology and its applications are putting forward new challenges to redactable signatures. This paper summarizes and analyses redactable signatures in terms of algorithm definition, security model and representative designs. Furthermore, some existing problems worthy of further study are also discussed.
History
Related Materials
- 1.
Location
Beijing, ChinaLanguage
chiPublication classification
C Journal article, C1 Refereed article in a scholarly journalCopyright notice
2017, Zhongguo Kexueyuan Jisuan Jishu YanjiusuoJournal
Jisuanji Yanjiu yu Fazhan/Computer research and developmentVolume
54Pagination
2144-2152ISSN
1000-1239Issue
10Publisher
Zhongguo Kexueyuan Jisuan Jishu Yanjiusuo / Chinese Academy of Sciences, Institute of Computing TechnologyUsage metrics
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

