학술논문

Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Document Type
Conference
Source
Proceedings of the 2008 ACM symposium on Information, computer and communications security. :353-362
Subject
audit logs
data integrity
data privacy
digital signatures
pseudonyms
redaction
Language
English
Abstract
In this paper we give a new signature algorithm that allows for controlled changes to the signed data. The change operations we study are removal of subdocuments (redaction), pseudonymization, and gradual deidentification of hierarchically structured data. These operations are applicable in a number of practically relevant application scenarios, including the release of previously classified government documents, privacy-aware management of audit-log data, and the release of tables of health records. When applied directly to redaction, our algorithm improves on [18] by reducing significantly the overhead of cryptographic information that has to be stored with the original data.

Online Access