Sequential Bitwise Sanitizable Signature Schemes
スポンサーリンク
概要
- 論文の詳細を見る
A sanitizable signature scheme is a signature scheme which, after the signer generates a valid signature of a message, allows a specific entity (sanitizer) to modify the message for hiding several parts. Existing sanitizable signature schemes require the message to be divided into pre-defined blocks before signing so that each block can be sanitized independently. However, there are cases where the parts of the message which are needed to be sanitized can not be determined in the time of signing. Thus, it is difficult to decide the partition of the blocks in such cases. Since the length of the signature is usually proportional to the number of blocks, signing every bit independently will make the signature too long. In this paper, we propose a solution by introducing a new concept called sequential bitwise sanitizable signature schemes, where any sequence of bits of the signed document can be made sanitizable without pre-defining them, and without increasing the length of signature. We also show that a one-way permutation suffices to get a secure construction, which is theoretically interesting in its own right, since all the other existing schemes are constructed using stronger assumptions.
著者
-
MIYAJI Atsuko
Japan Advanced Institute of Science and Technology
-
Hirose Shoichi
Graduate School of Engineering, The University of Fukui
-
SANTOSO Bagus
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
HANAOKA Goichiro
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
MIYAZAKI Kunihiko
The Systems Development Laboratory, Hitachi Ltd.
-
YANG Peng
Institute of Industrial Science, The University of Tokyo
関連論文
- Differentiability of four prefix-free PGV hash functions
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
- Sequential Bitwise Sanitizable Signature Schemes
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Unconditionally Secure Chaffing-and-Winnowing
- Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability(Symmetric Key Cryptography)(Cryptography and Information Security)
- A note on practical key derivation functions (情報処理)
- A Note on the Strength of Weak Collision Resistance(Discrete Mathematics and Its Applications)
- An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt (Information Security)
- An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt
- Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- Invisibly Sanitizable Digital Signature Scheme
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- A note on practical key derivation functions (情報セキュリティ)
- A Forward Secure Identity Based Encryption Scheme with Master Key Update
- Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception(Wireless Communication Technology, Multi-dimensional Mobile Information Networks)
- Multistage Interference Canceller Combined with Adaptive Array Antenna for DS-CDMA System(Special Section on Multi-dimensional Mobile Information Networks)
- Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
- Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
- Software Obfuscation on a Theoretical Basis and Its Implementation
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
- Sequential Bitwise Sanitizable Signature Schemes
- A-7-1 Related-Key Cube Attack on KATAN48
- New Concrete Relation between Trace, Definition Field, and Embedding Degree