Policy-Based Sanitizable Signatures

被引:21
|
作者
Samelin, Kai [1 ]
Slamanig, Daniel [2 ]
机构
[1] TUV Rheinland I Sec GmbH, Hallbergmoos, Germany
[2] AIT Austrian Inst Technol, Vienna, Austria
来源
关键词
SECURITY; SCHEMES;
D O I
10.1007/978-3-030-40186-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sanitizable signatures are a variant of signatures which allow a single, and signer-defined, sanitizer to modify signed messages in a controlled way without invalidating the respective signature. They turned out to be a versatile primitive, proven by different variants and extensions, e.g., allowing multiple sanitizers or adding new sanitizers oneby-one. However, existing constructions are very restricted regarding their flexibility in specifying potential sanitizers. We propose a different and more powerful approach: Instead of using sanitizers' public keys directly, we assign attributes to them. Sanitizing is then based on policies, i.e., access structures defined over attributes. A sanitizer can sanitize, if, and only if, it holds a secret key to attributes satisfying the policy associated to a signature, while offering full-scale accountability.
引用
收藏
页码:538 / 563
页数:26
相关论文
共 50 条
  • [11] Trapdoor Sanitizable Signatures Made Easy
    Yum, Dae Hyun
    Seo, Jae Woo
    Lee, Pil Joong
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 53 - 68
  • [12] Policy-based networking
    Chadha, R
    Lapiotis, G
    Wright, S
    IEEE NETWORK, 2002, 16 (02): : 8 - 9
  • [13] Sanitizable Signatures with Strong Transparency in the Standard Model
    Agrawal, Shivank
    Kumar, Swarun
    Shareef, Amjed
    Rangan, C. Pandu
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 93 - 107
  • [14] Image Segmentation Methods for Sanitizable Signatures
    Wu, Jing
    Oouti, Yuma
    Araki, Shunsuke
    Kakizaki, Ken'ichi
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2014,
  • [15] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [16] Policy-based cryptography and applications
    Bagga, W
    Molva, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 72 - 87
  • [17] Partnerships in policy-based lending
    Watt, P
    Conditionality Revisited: Concepts, Experiences, and Lessons, 2005, : 249 - 252
  • [18] Hierarchical policy-based replication
    Doherty, Cormac J.
    Hurley, Neil J.
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 254 - +
  • [19] Policy-based cognitive radios
    Wilkins, David
    Denker, Grit
    Stehr, Mark-Oliver
    Elenius, Daniel
    Senanayake, Rukman
    Talcott, Carolyn
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (04) : 41 - 46
  • [20] Policy-based Behavior Control
    Lin Zhi
    Wang Jing
    Jia Lian-xing
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4498 - +