Abstract
Sanitizable signatures allow a designated entity to modify some specific parts of a signed message and to produce a new signature of the resulting message without any interaction with the original signer. In this paper, we extend these sanitizable signatures to formally introduce trapdoor sanitizable signatures. In this concept, the power of sanitization is given to possibly several entities, for a given message/signature by using a trapdoor computed by the signer at any time. We also give a generic construction of such trapdoor sanitizable signatures. Eventually, we apply our new cryptographic tool to group content protection, permitting members of the group to distribute a protected content among themselves.
This work has been financially supported by the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable Signatures. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005)
Ateniese, G., de Medeiros, B.: Identity-based chameleon hash and application. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164–180. Springer, Heidelberg (2004)
Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165–179. Springer, Heidelberg (2005)
Bellare, M., Rogaway, P.: The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)
Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2), 281–308 (1988)
Izu, T., Kanaya, N., Takenaka, M., Yoshioka, T.: PIATS: A Partially Sanitizable Signature Scheme. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 72–83. Springer, Heidelberg (2005)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Klonowski, M., Lauks, A.: Extended Sanitizable Signatures. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 343–355. Springer, Heidelberg (2006)
Krawczyk, H., Rabin, T.: Chameleon Signatures. In: Proc. NDSS 2000, pp. 143–154. The Internet Society (2000)
Miyazaki, K., Iwamura, M., Matsumoto, T., Sakai, R., Yoshiura, H., Tezuka, S., Imai, H.: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Trans. on Fundamentals E88-A(1), 239–246 (2005)
Miyazaki, K., Susaki, S., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H.: Digital Documents Sanitizing Problem. IEICE technical report, ISEC 2003-20 (2003)
Naccache, D., Whelan, C.: 9/11: Who Alerted the CIA (And Other Secret Secrets). In: Eurocrypt 2004 rump session (2004)
RSA Labs. RSA Cryptography Standard: EMSAPSS – PKCS#1 v2.1 (2002)
Steinfeld, R., Bull, L., Zheng, Y.: Content Extraction Signatures. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 286–304. Springer, Heidelberg (2002)
Suzuki, M., Isshiki, T., Tanaka, K.: Sanitizable Signature with Secret Information. Tokyo Institute of Technology Research Report, C-215, pp. 1–20 (2005)
Zhang, F., Safavi-Naini, R., Susilo, W.: ID-Based Chameleon Hashes from Bilinear Pairings. Cryptology ePrint Archive, Report, 2003/208 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Canard, S., Laguillaumie, F., Milhau, M. (2008). Trapdoor Sanitizable Signatures and Their Application to Content Protection. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds) Applied Cryptography and Network Security. ACNS 2008. Lecture Notes in Computer Science, vol 5037. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68914-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-68914-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68913-3
Online ISBN: 978-3-540-68914-0
eBook Packages: Computer ScienceComputer Science (R0)