Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than that for the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is demanded by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information correctly because the information has been altered to prevent the leakage of sensitive information. That is, with current digital signature schemes, the confidentiality of official information is incompatible with the integrity of that information. This is called the digital document sanitizing problem, and some solutions such as digital document sanitizing schemes and content extraction signatures have been proposed. In this paper, we point out that the conventional digital signature schemes are vulnerable to additional sanitizing attack and show how this vulnerability can be eliminated by using a new digitally signed document sanitizing scheme with disclosure condition control.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
Miyazaki Kunihiko
Systems Development Laboratory Hitachi Ltd.:university Of Tokyo
-
Miyazaki Kunihiko
Systems Development Laboratory Hitachi Ltd.
-
MATSUMOTO Tsutomu
Yokohama National University
-
IWAMURA Mitsuru
Waseda University
-
SASAKI Ryoichi
Tokyo Denki University
-
YOSHIURA Hiroshi
University of Electro-Communications
-
TEZUKA Satoru
Systems Development Laboratory, Hitachi Ltd.
-
IMAI Hideki
University of Tokyo
-
Tezuka Satoru
Systems Development Laboratory Hitachi Ltd.
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
-
Yoshiura H
Faculty Of Electro-communication The University Of Electro-communications
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- On the security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis(Special Section on Cryptography and Information Security)
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- Invisibly Sanitizable Digital Signature Scheme
- How to Protect Peer-to-Peer Online Games from Cheats
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- FOREWORD (Special Section on Cryptography and Information Security)
- Generalized Powering Functions and Their Application to Digital Signatures(Digital Signature, Cryptography and Information Security)
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- New Short Signature Scheme without Random Oracles
- Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- 動き検出を利用したMPEGエンコーダ向け動画用電子透かし
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)
- Information-Flow-Based Access Control for Web Browsers
- Effectiveness of Outline Measures of Strength against Differential and Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Batch Logical Protocols for Efficient Multi-Party Computation
- Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- FOREWORD
- A Recommendation System for Anonymous Fingerprinting of Text Posted on Social Networks
- Catching the Behavioral Differences between Multiple Executions for Malware Detection