Policy-Based Sanitizable Signatures

被引:21
|
作者
Samelin, Kai [1 ]
Slamanig, Daniel [2 ]
机构
[1] TUV Rheinland I Sec GmbH, Hallbergmoos, Germany
[2] AIT Austrian Inst Technol, Vienna, Austria
来源
关键词
SECURITY; SCHEMES;
D O I
10.1007/978-3-030-40186-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sanitizable signatures are a variant of signatures which allow a single, and signer-defined, sanitizer to modify signed messages in a controlled way without invalidating the respective signature. They turned out to be a versatile primitive, proven by different variants and extensions, e.g., allowing multiple sanitizers or adding new sanitizers oneby-one. However, existing constructions are very restricted regarding their flexibility in specifying potential sanitizers. We propose a different and more powerful approach: Instead of using sanitizers' public keys directly, we assign attributes to them. Sanitizing is then based on policies, i.e., access structures defined over attributes. A sanitizer can sanitize, if, and only if, it holds a secret key to attributes satisfying the policy associated to a signature, while offering full-scale accountability.
引用
收藏
页码:538 / 563
页数:26
相关论文
共 50 条
  • [21] Policy-Based Blockchain Selection
    Scheid, Eder John
    Rodrigues, Bruno
    Stiller, Burkhard
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (10) : 48 - 54
  • [22] A policy-based framework for RBAC
    Nabhen, R
    Jamhour, E
    Maziero, C
    SELF-MANAGING DISTRIBUTED SYSTEMS, 2003, 2867 : 181 - 193
  • [23] Policy-based IPsec management
    Li, M
    IEEE NETWORK, 2003, 17 (06): : 36 - 43
  • [24] Policy-based network management
    Choudhary, AR
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 19 - 29
  • [25] Policy-based landing in LICUS
    Collier, P
    Conditionality Revisited: Concepts, Experiences, and Lessons, 2005, : 113 - 116
  • [26] The policy-based approach to identification
    Miller, Christian
    PHILOSOPHICAL PSYCHOLOGY, 2007, 20 (01) : 105 - 125
  • [27] Policy-based network management
    Wang, CK
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 101 - 105
  • [28] Policy-based frequency management
    Wagner, Gregory C.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1775 - 1779
  • [29] Policy-based automated provisioning
    Appleby, K
    Calo, SB
    Giles, JR
    Lee, KW
    IBM SYSTEMS JOURNAL, 2004, 43 (01) : 121 - 135
  • [30] On Properties of Policy-Based Specifications
    Margheri, Andrea
    Pugliese, Rosario
    Tiezzi, Francesco
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2015, (188): : 33 - 50