Efficient signature schemes supporting redaction, pseudonymization, and data deidentification

  • Authors:
  • Stuart Haber;Yasuo Hatano;Yoshinori Honda;William Horne;Kunihiko Miyazaki;Tomas Sander;Satoru Tezoku;Danfeng Yao

  • Affiliations:
  • Hewlett-Packard;Hitachi Ltd.;Hitachi Ltd.;Hewlett-Packard;Hitachi Ltd.;Hewlett-Packard;Hitachi Ltd.;Rutgers University

  • Venue:
  • Proceedings of the 2008 ACM symposium on Information, computer and communications security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we give a new signature algorithm that allows for controlled changes to the signed data. The change operations we study are removal of subdocuments (redaction), pseudonymization, and gradual deidentification of hierarchically structured data. These operations are applicable in a number of practically relevant application scenarios, including the release of previously classified government documents, privacy-aware management of audit-log data, and the release of tables of health records. When applied directly to redaction, our algorithm improves on [18] by reducing significantly the overhead of cryptographic information that has to be stored with the original data.