A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Incremental cryptography and application to virus protection
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Improving SSL Handshake Performance via Batching
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Incremental Cryptography: The Case of Hashing and Signing
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
On the Security of RSA Screening
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Transitive Signatures Based on Factoring and RSA
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Content extraction signatures using XML digital signatures and custom transforms on-demand
WWW '03 Proceedings of the 12th international conference on World Wide Web
Digitally signed document sanitizing scheme based on bilinear maps
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Proceedings of the 4th ACM international workshop on Storage security and survivability
Sanitizable Signatures Revisited
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Invisibly Sanitizable Digital Signature Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Sanitizable and Deletable Signature
Information Security Applications
Security of Sanitizable Signatures Revisited
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Short Redactable Signatures Using Random Trees
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A Storage Efficient Redactable Signature in the Standard Model
ISC '09 Proceedings of the 12th International Conference on Information Security
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A sanitizable signature scheme with aggregation
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Grouping verifiable content for selective disclosure
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Context adapted certificate using morph template signature for pervasive environments
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Trapdoor sanitizable signatures and their application to content protection
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Healthcom'09 Proceedings of the 11th international conference on e-Health networking, applications and services
Trapdoor sanitizable signatures made easy
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Redactable signatures for tree-structured data: definitions and constructions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Anonymizable signature and its construction from pairings
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Homomorphic signatures for polynomial functions
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Hierarchical identity-based chameleon hash and its applications
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Fully-secure and practical sanitizable signatures
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
A new method for the design of stateless transitive signature schemes
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
PIATS: a partially sanitizable signature scheme
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Unlinkability of sanitizable signatures
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Extended sanitizable signatures
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Generalizations and extensions of redactable signatures with applications to electronic healthcare
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Homomorphic signatures for digital photographs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Computing on authenticated data
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Redactable signatures for independent removal of structure and content
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Redactable Signatures for Signed CDA Documents
Journal of Medical Systems
STM'11 Proceedings of the 7th international conference on Security and Trust Management
On structural signatures for tree data structures
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
X316 security toolbox for new generation of certificate
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Computing on authenticated data for adjustable predicates
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
A trusted versioning file system for passive mobile storage devices
Journal of Network and Computer Applications
Hi-index | 0.00 |
Motivated by emerging needs in online interactions, we define a new type of digital signature called a 'Content Extraction Signature' (CES). A CES allows the owner, Bob, of a document signed by Alice, to produce an 'extracted signature' on selected extracted portions of the original document, which can be verified (to originate from Alice) by any third party Cathy, without knowledge of the unextracted (removed) document portions. The new signature therefore achieves verifiable content extraction with minimal multi-party interaction. We specify desirable functional and security requirements from a CES (including an efficiency requirement: a CES should be more efficient in either computation or communication than the simple multiple signature solution). We propose and analyse four provably secure CES constructions which satisfy our requirements, and evaluate their performance characteristics.