Sanitizable and Deletable Signature

  • Tetsuya Izu
  • Noboru Kunihiro
  • Kazuo Ohta
  • Makoto Sano
  • Masahiko Takenaka
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5379)


Recently, the sanitizable signature attracts much attention since it allows to modify (sanitize) the document for hiding partial information without keeping the integrity of the disclosed subdocuments. Sanitizable signatures are quite useful in governmental or military offices, where there is a dilemma between disclosure laws for public documents and privacy or diplomatic secrets. Since a verifier can detect whether the document was sanitized or not, especially which subdocuments was sanitized, the scheme does not establish the perfect hiding. In order to solve the problem, the deletable signature was introduced in 2006. However, because these schemes are not compatible to each other, we have to select the scheme to meet the requirement. In this paper, we propose the sanitizable and deletable signature as a combination of the sanitizable signature and the deletable signature. We also establish two concrete sanitizable and deletable signatures based on the deletable signature by Miyazaki, Hanaoka and Imai.


Digital signature sanitizable signature deletable signature aggregate signature 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ateniese, G., Chou, D.H., Medeiros, B., Tsudik, G.: Sanitizable signatures. In: di Vimercati, S.D., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Gentry, G., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Izu, T., Kanaya, N., Takenaka, M., Yoshioka, T.: PIATS: A partially sanitizable signature scheme. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 72–83. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Izu, T., Kunihiro, N., Ohta, K., Takenaka, M., Yoshioka, T.: Sanitizable Signature Schemes with Aggregation. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 51–64. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic Signature Scheme. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Klonowski, M., Lauks, A.: Extended Sanitizable Signatures. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 343–355. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from Trapdoor Permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Miyazaki, K., Hanaoka, G., Imai, H.: Digitally Signed Document Sanitizing Scheme Based on Bilinear Maps. In: 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), pp. 343–354. ACM Press, New York (2006)Google Scholar
  10. 10.
    Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S., Imai, H.: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. The Institute of Electronics. Information and Communication Engineers (IEICE) Trans. on Fundamentals E88-A(1), 239–246 (2005)CrossRefGoogle Scholar
  11. 11.
    Steinfeld, R., Bull, L., Zheng, Y.: Content Extraction Signatures. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 285–304. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  12. 12.
    Suzuki, M., Isshiki, T., Tanaka, K.: Sanitizable Signature with Secret Information: Technical report, 2006 Symposium on Cryptography and Information Security (SCIS 2006), p. 273 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Tetsuya Izu
    • 1
  • Noboru Kunihiro
    • 2
  • Kazuo Ohta
    • 3
  • Makoto Sano
    • 3
  • Masahiko Takenaka
    • 1
  1. 1.FUJITSU LABORATORIES Ltd.CKawasakiJapan
  2. 2.The University of TokyoKashiwaJapan
  3. 3.The University of Electro-CommunicationsChofuJapan

Personalised recommendations