Non-interactive editable signatures for assured data provenance

Haifeng Qian*, Shouhuai Xu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In order to make people truly benefit from data sharing, we need technical solutions to assuring the trustworthiness of data received from parties one may not have encountered in the past. Assured data provenance is an important means for this purpose because it (i) allows data providers to get credited for their contribution or sharing of data, (ii) is able to hold the data providers accountable for the data they contributed, and (iii) enables the data providers to supply high-quality data in a self-healing fashion. While the above (i) and (ii) have been investigated to some extent, the above (iii) is a new perspective that, to our knowledge, has not been investigated in the literature. In this paper, we introduce a novel cryptographic technique that can simultaneously offer these properties. Our technique is called editable signatures, which allow a user, Bob, to edit (e.g., replace, modify, and insert) some portions of the message that is contributed and signed by Alice such that the resulting edited message is jointly signed by Alice and Bob in some fashion. While it is easy to see that the above (i) and (ii) are achieved, the above (iii) is also achieved because Bob may have a better knowledge of the situation that allows him to provide more accurate/trustworthy information than Alice, who may intentionally or unintentionally enter inaccurate or even misleading data into an information network. This is useful because Alice's inaccurate or even misleading information will never be released into an information network if it can be "cleaned" or "healed" by Bob. Specifically, we propose two novel cryptographic constructions that can be used to realize the above functions in some practical settings.

Original languageEnglish
Title of host publicationCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
Pages145-156
Number of pages12
DOIs
StatePublished - 2011
Event1st ACM Conference on Data and Application Security and Privacy, CODASPY'11 - San Antonio, TX, United States
Duration: 21 Feb 201123 Feb 2011

Publication series

NameCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy

Conference

Conference1st ACM Conference on Data and Application Security and Privacy, CODASPY'11
Country/TerritoryUnited States
CitySan Antonio, TX
Period21/02/1123/02/11

Keywords

  • Aggregate signatures
  • Assured data provenance
  • Data provenance
  • Data trustworthiness
  • Digital signatures
  • Editable signatures
  • Multisignatures

Fingerprint

Dive into the research topics of 'Non-interactive editable signatures for assured data provenance'. Together they form a unique fingerprint.

Cite this