Editing-enabled signatures: A new tool for editing authenticated data
Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5300 https://ink.library.smu.edu.sg/context/sis_research/article/6303/viewcontent/Editing_Enabled_Signatures_IoTJ_2020_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6303 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-63032021-07-14T00:51:37Z Editing-enabled signatures: A new tool for editing authenticated data SENGUPTA, Binanda LI, Yingjiu TIAN, Yangguang DENG, Robert H. Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified using an operation from this set only. Moreover, the editor does not need to interact with the data owner in order to authenticate the data every time it is modified. We construct an editing-enabled signature (EES) scheme that derives its efficiency from mostly lightweight cryptographic primitives. We formalize the security model for editing-enabled signatures and analyze the security of our EES scheme. Editing-enabled signatures can find numerous applications that involve generic editing tasks and privacy-preserving operations. We demonstrate how our EES scheme can be applied in two privacy-preserving applications. 2020-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5300 info:doi/10.1109/JIOT.2020.2972741 https://ink.library.smu.edu.sg/context/sis_research/article/6303/viewcontent/Editing_Enabled_Signatures_IoTJ_2020_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Receivers Internet of Things IoT cloud computing Servers Authentication Task analysis Editing-enabled signatures editing functions hash-chains privacy-preserving applications Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Receivers Internet of Things IoT cloud computing Servers Authentication Task analysis Editing-enabled signatures editing functions hash-chains privacy-preserving applications Information Security |
spellingShingle |
Receivers Internet of Things IoT cloud computing Servers Authentication Task analysis Editing-enabled signatures editing functions hash-chains privacy-preserving applications Information Security SENGUPTA, Binanda LI, Yingjiu TIAN, Yangguang DENG, Robert H. Editing-enabled signatures: A new tool for editing authenticated data |
description |
Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified using an operation from this set only. Moreover, the editor does not need to interact with the data owner in order to authenticate the data every time it is modified. We construct an editing-enabled signature (EES) scheme that derives its efficiency from mostly lightweight cryptographic primitives. We formalize the security model for editing-enabled signatures and analyze the security of our EES scheme. Editing-enabled signatures can find numerous applications that involve generic editing tasks and privacy-preserving operations. We demonstrate how our EES scheme can be applied in two privacy-preserving applications. |
format |
text |
author |
SENGUPTA, Binanda LI, Yingjiu TIAN, Yangguang DENG, Robert H. |
author_facet |
SENGUPTA, Binanda LI, Yingjiu TIAN, Yangguang DENG, Robert H. |
author_sort |
SENGUPTA, Binanda |
title |
Editing-enabled signatures: A new tool for editing authenticated data |
title_short |
Editing-enabled signatures: A new tool for editing authenticated data |
title_full |
Editing-enabled signatures: A new tool for editing authenticated data |
title_fullStr |
Editing-enabled signatures: A new tool for editing authenticated data |
title_full_unstemmed |
Editing-enabled signatures: A new tool for editing authenticated data |
title_sort |
editing-enabled signatures: a new tool for editing authenticated data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/5300 https://ink.library.smu.edu.sg/context/sis_research/article/6303/viewcontent/Editing_Enabled_Signatures_IoTJ_2020_av.pdf |
_version_ |
1770575375314714624 |