ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2017, Vol. 54 ›› Issue (10): 2144-2152.doi: 10.7544/issn1000-1239.2017.20170646

Special Issue: 2017应用驱动的网络空间安全研究进展

Previous Articles     Next Articles

Survey on Redactable Signatures

Ma Jinhua1,2, Liu Jianghua3, Wu Wei1,2, Huang Xinyi1,2   

  1. 1(School of Mathematics and Information, Fujian Normal University, Fuzhou 350007); 2(Fujian Provincial Key Laboratory of Network Security and Cryptology (Fujian Normal University), Fuzhou 350007); 3(School of Information Technology, Deakin University, Melbourne, Australia 3125)
  • Online:2017-10-01

Abstract: Data security issues have become a serious challenge to national economic, political, defence and cultural security. As a core technology in protecting data security, digital signatures have been widely used for the verification of data integrity and source authenticity. The security definition of conventional digital signatures is existentially unforgeable against adaptive chosen-message attacks. Although it meets the basic security requirement of data authentication, it hampers the reasonable operation of authenticated data which is desirable in many practical applications. As a type of malleable homomorphic signatures for editing, redactable signatures allow the signature holder (redactor) to delete sensitive portions of the signed data and generate a valid signature for the disclosed data without any help from the original signer. It has been a research hotspot in the field of cryptography since it was introduced in 2001. In recent years, many researchers have studied redactable signatures from the aspects of formal security definition, redaction control mechanism, computational cost and communication overhead, and there are lots of research results. However, the rapid development of network technology and its applications are putting forward new challenges to redactable signatures. This paper summarizes and analyses redactable signatures in terms of algorithm definition, security model and representative designs. Furthermore, some existing problems worthy of further study are also discussed.

Key words: redactable signatures, homomorphic signatures, digital signature, data authentication, security model

CLC Number: