ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2017, Vol. 54 ›› Issue (10): 2144-2152.doi: 10.7544/issn1000-1239.2017.20170646

所属专题: 2017应用驱动的网络空间安全研究进展

• 综述 • 上一篇    下一篇

可修订数字签名研究综述

马金花1,2,刘江华3,伍玮1,2,黄欣沂1,2   

  1. 1(福建师范大学数学与信息学院 福州 350007); 2(福建省网络安全与密码技术重点实验室(福建师范大学) 福州 350007); 3(澳大利亚迪肯大学信息技术学院 澳大利亚墨尔本 3125) (jinhuama55@hotmail.com)
  • 出版日期: 2017-10-01
  • 基金资助: 
    国家自然科学基金项目(61402110,61472083,61771140);福建师范大学校创新团队基金项目(IRTL1207);福建省杰出青年科学基金项目(2016J06013)

Survey on Redactable Signatures

Ma Jinhua1,2, Liu Jianghua3, Wu Wei1,2, Huang Xinyi1,2   

  1. 1(School of Mathematics and Information, Fujian Normal University, Fuzhou 350007); 2(Fujian Provincial Key Laboratory of Network Security and Cryptology (Fujian Normal University), Fuzhou 350007); 3(School of Information Technology, Deakin University, Melbourne, Australia 3125)
  • Online: 2017-10-01

摘要: 数据的安全问题已成为关系国家经济、政治、国防、文化安全的重大问题.数字签名可验证数据内容的完整性和数据源的真实性,是保障数据安全的核心技术之一.数字签名的传统安全要求为在自适应选择消息攻击下满足存在不可伪造性.虽然数字签名的传统安全目标能满足数据认证的基本要求,但也阻碍了对已签名数据的合理操作,不能满足很多实际应用的需求.可修订签名是一类支持编辑操作的具有同态性质的数字签名.在不与签名人交互的情况下,签名持有人(修订者)可删除已签名数据中的敏感子数据,并计算修订后数据的有效签名.自2001年可修订数字签名被正式提出以来,就一直是应用密码学领域的研究热点.近年来许多国内外的学者从形式化安全定义、修订规则、计算效率、通信效率等多个方面对其进行探索研究,相继取得了一批有意义的研究成果.网络技术及其应用的快速发展在不断地对可修订数字签名提出新的要求,将从其核心算法定义、安全模型以及现有的代表性方案等方面对可修订数字签名进行概括和分析,并探讨值得进一步研究的问题.

关键词: 可修订签名, 同态签名, 数字签名, 数据认证, 安全模型

Abstract: Data security issues have become a serious challenge to national economic, political, defence and cultural security. As a core technology in protecting data security, digital signatures have been widely used for the verification of data integrity and source authenticity. The security definition of conventional digital signatures is existentially unforgeable against adaptive chosen-message attacks. Although it meets the basic security requirement of data authentication, it hampers the reasonable operation of authenticated data which is desirable in many practical applications. As a type of malleable homomorphic signatures for editing, redactable signatures allow the signature holder (redactor) to delete sensitive portions of the signed data and generate a valid signature for the disclosed data without any help from the original signer. It has been a research hotspot in the field of cryptography since it was introduced in 2001. In recent years, many researchers have studied redactable signatures from the aspects of formal security definition, redaction control mechanism, computational cost and communication overhead, and there are lots of research results. However, the rapid development of network technology and its applications are putting forward new challenges to redactable signatures. This paper summarizes and analyses redactable signatures in terms of algorithm definition, security model and representative designs. Furthermore, some existing problems worthy of further study are also discussed.

Key words: redactable signatures, homomorphic signatures, digital signature, data authentication, security model

中图分类号: