Content extraction signatures

Ron Steinfeld, Laurence Bull, Yuliang Zheng

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

140 Citations (Scopus)

Abstract

Motivated by emerging needs in online interactions, we define a new type of digital signature called a ‘Content Extraction Signature’ (CES). A CES allows the owner, Bob, of a document signed by Alice, to produce an ‘extracted signature’ on selected extracted portions of the original document, which can be verified (to originate from Alice) by any third party Cathy, without knowledge of the unextracted (removed) document portions. The new signature therefore achieves verifiable content extraction with minimal multi-party interaction. We specify desirable functional and security requirements from a CES (including an efficiency requirement: a CES should be more efficient in either computation or communication than the simple multiple signature solution). We propose and analyse four provably secure CES constructions which satisfy our requirements, and evaluate their performance characteristics.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings
EditorsKwangjo Kim
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages285-304
Number of pages20
Volume2288
ISBN (Print)3540433198, 9783540433194
Publication statusPublished - 2002
Event4th International Conference on Information Security and Cryptology, ICISC 2001 - Seoul, Korea, Republic of
Duration: 6 Dec 20017 Dec 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2288
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on Information Security and Cryptology, ICISC 2001
CountryKorea, Republic of
CitySeoul
Period6/12/017/12/01

Keywords

  • Content blinding
  • Content verification
  • Content-extraction
  • Digital signatures
  • Fact verification
  • Fragment-extraction
  • Provable security

Fingerprint Dive into the research topics of 'Content extraction signatures'. Together they form a unique fingerprint.

  • Cite this

    Steinfeld, R., Bull, L., & Zheng, Y. (2002). Content extraction signatures. In K. Kim (Ed.), Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings (Vol. 2288, pp. 285-304). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2288). Berlin; New York: Springer, Springer Nature.