Verifiable Document Redacting View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-08-12

AUTHORS

Hervé Chabanne , Rodolphe Hugel , Julien Keuffer

ABSTRACT

In 2016, Naveh and Tromer introduced PhotoProof, a novel approach to image authentication based on cryptographic proofs. We here show how to simplify PhotoProof to get a protocol closely related to redactable signature schemes. From an authenticated breeder document, we only keep the necessary fields to prove what its owner wants to assert and black out all the others to remove sensitive data from the document. We efficiently instantiate our scheme and give implementation results that show its practicality. More... »

PAGES

334-351

Book

TITLE

Computer Security – ESORICS 2017

ISBN

978-3-319-66401-9
978-3-319-66402-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20

DOI

http://dx.doi.org/10.1007/978-3-319-66402-6_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1091160345


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Telecom ParisTech, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.463717.0", 
          "name": [
            "Morpho, Issy-les-Moulineaux, France", 
            "Telecom ParisTech, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chabanne", 
        "givenName": "Herv\u00e9", 
        "id": "sg:person.015205413777.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Morpho, Issy-les-Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.423851.9", 
          "name": [
            "Morpho, Issy-les-Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hugel", 
        "givenName": "Rodolphe", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Eurecom, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "Morpho, Issy-les-Moulineaux, France", 
            "Eurecom, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Keuffer", 
        "givenName": "Julien", 
        "id": "sg:person.016007512540.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016007512540.26"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-08-12", 
    "datePublishedReg": "2017-08-12", 
    "description": "In 2016, Naveh and Tromer introduced PhotoProof, a novel approach to image authentication based on cryptographic proofs. We here show how to simplify PhotoProof to get a protocol closely related to redactable signature schemes. From an authenticated breeder document, we only keep the necessary fields to prove what its owner wants to assert and black out all the others to remove sensitive data from the document. We efficiently instantiate our scheme and give implementation results that show its practicality.", 
    "editor": [
      {
        "familyName": "Foley", 
        "givenName": "Simon N.", 
        "type": "Person"
      }, 
      {
        "familyName": "Gollmann", 
        "givenName": "Dieter", 
        "type": "Person"
      }, 
      {
        "familyName": "Snekkenes", 
        "givenName": "Einar", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-66402-6_20", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-66401-9", 
        "978-3-319-66402-6"
      ], 
      "name": "Computer Security \u2013 ESORICS 2017", 
      "type": "Book"
    }, 
    "keywords": [
      "redactable signature scheme", 
      "cryptographic proofs", 
      "sensitive data", 
      "breeder documents", 
      "signature scheme", 
      "implementation results", 
      "novel approach", 
      "necessary field", 
      "documents", 
      "scheme", 
      "authentication", 
      "Tromer", 
      "practicality", 
      "protocol", 
      "proof", 
      "owners", 
      "data", 
      "field", 
      "results", 
      "Naveh", 
      "approach", 
      "PhotoProof", 
      "Verifiable Document"
    ], 
    "name": "Verifiable Document Redacting", 
    "pagination": "334-351", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1091160345"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-66402-6_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-66402-6_20", 
      "https://app.dimensions.ai/details/publication/pub.1091160345"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-11-01T18:58", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/chapter/chapter_374.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-66402-6_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'


 

This table displays all metadata directly associated to this object as RDF triples.

114 TRIPLES      23 PREDICATES      48 URIs      41 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-66402-6_20 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N620f0c07d7234c32a4b7c6268cf2c992
4 schema:datePublished 2017-08-12
5 schema:datePublishedReg 2017-08-12
6 schema:description In 2016, Naveh and Tromer introduced PhotoProof, a novel approach to image authentication based on cryptographic proofs. We here show how to simplify PhotoProof to get a protocol closely related to redactable signature schemes. From an authenticated breeder document, we only keep the necessary fields to prove what its owner wants to assert and black out all the others to remove sensitive data from the document. We efficiently instantiate our scheme and give implementation results that show its practicality.
7 schema:editor Ncbf6b500c399402f93229c5001b27f81
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N652d192563d241079d8d5764ed463e6e
12 schema:keywords Naveh
13 PhotoProof
14 Tromer
15 Verifiable Document
16 approach
17 authentication
18 breeder documents
19 cryptographic proofs
20 data
21 documents
22 field
23 implementation results
24 necessary field
25 novel approach
26 owners
27 practicality
28 proof
29 protocol
30 redactable signature scheme
31 results
32 scheme
33 sensitive data
34 signature scheme
35 schema:name Verifiable Document Redacting
36 schema:pagination 334-351
37 schema:productId N20731ff0203d4e52a653e93fe1186ae2
38 Nb929685f8707432ba2d5a959fce28197
39 schema:publisher N06f34fd52b8e47ef974cea5b0a356ef9
40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091160345
41 https://doi.org/10.1007/978-3-319-66402-6_20
42 schema:sdDatePublished 2021-11-01T18:58
43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
44 schema:sdPublisher N000f4f46f32d47c386c647c2fa6a12a8
45 schema:url https://doi.org/10.1007/978-3-319-66402-6_20
46 sgo:license sg:explorer/license/
47 sgo:sdDataset chapters
48 rdf:type schema:Chapter
49 N000f4f46f32d47c386c647c2fa6a12a8 schema:name Springer Nature - SN SciGraph project
50 rdf:type schema:Organization
51 N06f34fd52b8e47ef974cea5b0a356ef9 schema:name Springer Nature
52 rdf:type schema:Organisation
53 N20731ff0203d4e52a653e93fe1186ae2 schema:name doi
54 schema:value 10.1007/978-3-319-66402-6_20
55 rdf:type schema:PropertyValue
56 N2077396973a445978183480fda591be7 schema:affiliation grid-institutes:grid.423851.9
57 schema:familyName Hugel
58 schema:givenName Rodolphe
59 rdf:type schema:Person
60 N4e9cda7866a04880aeb7b56955b258b6 rdf:first Nbf29943f08aa48868887cc1b0603068b
61 rdf:rest N51d958e90bd3499889ac7c8b70184998
62 N505445f7d2644b6fa75eb27ef8012394 rdf:first sg:person.016007512540.26
63 rdf:rest rdf:nil
64 N51d958e90bd3499889ac7c8b70184998 rdf:first Nb3384f234f494341b1ccf349ff3eedae
65 rdf:rest rdf:nil
66 N620f0c07d7234c32a4b7c6268cf2c992 rdf:first sg:person.015205413777.51
67 rdf:rest Na58df3db25a4458885e3d2c8f21976e5
68 N652d192563d241079d8d5764ed463e6e schema:isbn 978-3-319-66401-9
69 978-3-319-66402-6
70 schema:name Computer Security – ESORICS 2017
71 rdf:type schema:Book
72 N96c144e280b14bdabf0b38c921f01488 schema:familyName Foley
73 schema:givenName Simon N.
74 rdf:type schema:Person
75 Na58df3db25a4458885e3d2c8f21976e5 rdf:first N2077396973a445978183480fda591be7
76 rdf:rest N505445f7d2644b6fa75eb27ef8012394
77 Nb3384f234f494341b1ccf349ff3eedae schema:familyName Snekkenes
78 schema:givenName Einar
79 rdf:type schema:Person
80 Nb929685f8707432ba2d5a959fce28197 schema:name dimensions_id
81 schema:value pub.1091160345
82 rdf:type schema:PropertyValue
83 Nbf29943f08aa48868887cc1b0603068b schema:familyName Gollmann
84 schema:givenName Dieter
85 rdf:type schema:Person
86 Ncbf6b500c399402f93229c5001b27f81 rdf:first N96c144e280b14bdabf0b38c921f01488
87 rdf:rest N4e9cda7866a04880aeb7b56955b258b6
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.015205413777.51 schema:affiliation grid-institutes:grid.463717.0
95 schema:familyName Chabanne
96 schema:givenName Hervé
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51
98 rdf:type schema:Person
99 sg:person.016007512540.26 schema:affiliation grid-institutes:grid.28848.3e
100 schema:familyName Keuffer
101 schema:givenName Julien
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016007512540.26
103 rdf:type schema:Person
104 grid-institutes:grid.28848.3e schema:alternateName Eurecom, Biot, France
105 schema:name Eurecom, Biot, France
106 Morpho, Issy-les-Moulineaux, France
107 rdf:type schema:Organization
108 grid-institutes:grid.423851.9 schema:alternateName Morpho, Issy-les-Moulineaux, France
109 schema:name Morpho, Issy-les-Moulineaux, France
110 rdf:type schema:Organization
111 grid-institutes:grid.463717.0 schema:alternateName Telecom ParisTech, Paris, France
112 schema:name Morpho, Issy-les-Moulineaux, France
113 Telecom ParisTech, Paris, France
114 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...