Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security 2008
DOI: 10.1145/1368310.1368362
|View full text |Cite
|
Sign up to set email alerts
|

Efficient signature schemes supporting redaction, pseudonymization, and data deidentification

Abstract: In this paper we give a new signature algorithm that allows for controlled changes to the signed data. The change operations we study are removal of subdocuments (redaction), pseudonymization, and gradual deidentification of hierarchically structured data. These operations are applicable in a number of practically relevant application scenarios, including the release of previously classified government documents, privacy-aware management of audit-log data, and the release of tables of health records. When appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
28
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(29 citation statements)
references
References 19 publications
1
28
0
Order By: Relevance
“…The authors of [18] have recently proposed a concept to apply redactable signatures in context of Personal Health Records (PHRs) to realize minimum disclosure of personal information and to achieve cryptographic enforcement of dependencies between parts containing personal information. Another recent work developed independently from ours by Haber et al [15] can be considered as closest to the ideas presented in this paper. They present redactable signatures that can be used for pseudonymization and de-identification of data, although they mainly focus on relational, i.e.…”
Section: Medical Applicationssupporting
confidence: 54%
See 3 more Smart Citations
“…The authors of [18] have recently proposed a concept to apply redactable signatures in context of Personal Health Records (PHRs) to realize minimum disclosure of personal information and to achieve cryptographic enforcement of dependencies between parts containing personal information. Another recent work developed independently from ours by Haber et al [15] can be considered as closest to the ideas presented in this paper. They present redactable signatures that can be used for pseudonymization and de-identification of data, although they mainly focus on relational, i.e.…”
Section: Medical Applicationssupporting
confidence: 54%
“…Furthermore, [15] have recently extended the approach of [2], such that a signer can specify which parts of a document are allowed to be redacted. Their approach is similar to the one of [1].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This is especially true since further properties have been added to the models in subsequent works, like the requirement that the sanitizer's identity remains hidden [5] in the sanitizable signature model of [3], resembling the above notion of transparency. Nonetheless, one can divide the literature about sanitizable signatures roughly into the works following the approach by Ateniese et al, e.g., [6,7], and the works based on the approach by Miyazaki et al, including [8,9,10,5,11].…”
Section: Introductionmentioning
confidence: 99%