Verifiable Document Redacting View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-08-12

AUTHORS

Hervé Chabanne , Rodolphe Hugel , Julien Keuffer

ABSTRACT

In 2016, Naveh and Tromer introduced PhotoProof, a novel approach to image authentication based on cryptographic proofs. We here show how to simplify PhotoProof to get a protocol closely related to redactable signature schemes. From an authenticated breeder document, we only keep the necessary fields to prove what its owner wants to assert and black out all the others to remove sensitive data from the document. We efficiently instantiate our scheme and give implementation results that show its practicality. More... »

PAGES

334-351

Book

TITLE

Computer Security – ESORICS 2017

ISBN

978-3-319-66401-9
978-3-319-66402-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20

DOI

http://dx.doi.org/10.1007/978-3-319-66402-6_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1091160345


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Telecom ParisTech, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.463717.0", 
          "name": [
            "Morpho, Issy-les-Moulineaux, France", 
            "Telecom ParisTech, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chabanne", 
        "givenName": "Herv\u00e9", 
        "id": "sg:person.015205413777.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Morpho, Issy-les-Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.423851.9", 
          "name": [
            "Morpho, Issy-les-Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hugel", 
        "givenName": "Rodolphe", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Eurecom, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "Morpho, Issy-les-Moulineaux, France", 
            "Eurecom, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Keuffer", 
        "givenName": "Julien", 
        "id": "sg:person.016007512540.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016007512540.26"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-08-12", 
    "datePublishedReg": "2017-08-12", 
    "description": "In 2016, Naveh and Tromer introduced PhotoProof, a novel approach to image authentication based on cryptographic proofs. We here show how to simplify PhotoProof to get a protocol closely related to redactable signature schemes. From an authenticated breeder document, we only keep the necessary fields to prove what its owner wants to assert and black out all the others to remove sensitive data from the document. We efficiently instantiate our scheme and give implementation results that show its practicality.", 
    "editor": [
      {
        "familyName": "Foley", 
        "givenName": "Simon N.", 
        "type": "Person"
      }, 
      {
        "familyName": "Gollmann", 
        "givenName": "Dieter", 
        "type": "Person"
      }, 
      {
        "familyName": "Snekkenes", 
        "givenName": "Einar", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-66402-6_20", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-66401-9", 
        "978-3-319-66402-6"
      ], 
      "name": "Computer Security \u2013 ESORICS 2017", 
      "type": "Book"
    }, 
    "keywords": [
      "redactable signature scheme", 
      "cryptographic proofs", 
      "sensitive data", 
      "breeder documents", 
      "signature scheme", 
      "implementation results", 
      "novel approach", 
      "necessary field", 
      "documents", 
      "scheme", 
      "authentication", 
      "Tromer", 
      "practicality", 
      "protocol", 
      "proof", 
      "owners", 
      "data", 
      "field", 
      "results", 
      "Naveh", 
      "approach", 
      "PhotoProof", 
      "Verifiable Document"
    ], 
    "name": "Verifiable Document Redacting", 
    "pagination": "334-351", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1091160345"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-66402-6_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-66402-6_20", 
      "https://app.dimensions.ai/details/publication/pub.1091160345"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_144.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-66402-6_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-66402-6_20'


 

This table displays all metadata directly associated to this object as RDF triples.

114 TRIPLES      23 PREDICATES      48 URIs      41 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-66402-6_20 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N1fb1427fed634a3f9fcb2c834c35f0ff
4 schema:datePublished 2017-08-12
5 schema:datePublishedReg 2017-08-12
6 schema:description In 2016, Naveh and Tromer introduced PhotoProof, a novel approach to image authentication based on cryptographic proofs. We here show how to simplify PhotoProof to get a protocol closely related to redactable signature schemes. From an authenticated breeder document, we only keep the necessary fields to prove what its owner wants to assert and black out all the others to remove sensitive data from the document. We efficiently instantiate our scheme and give implementation results that show its practicality.
7 schema:editor N02d6f61687bd460c9b5d3d8930e8d442
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N04506820ca9a45439998b4ba6a89fc8e
12 schema:keywords Naveh
13 PhotoProof
14 Tromer
15 Verifiable Document
16 approach
17 authentication
18 breeder documents
19 cryptographic proofs
20 data
21 documents
22 field
23 implementation results
24 necessary field
25 novel approach
26 owners
27 practicality
28 proof
29 protocol
30 redactable signature scheme
31 results
32 scheme
33 sensitive data
34 signature scheme
35 schema:name Verifiable Document Redacting
36 schema:pagination 334-351
37 schema:productId N5989de08eef44881bf06f48f4876f8eb
38 Nb2624ee9235c4f63a780658c9533f510
39 schema:publisher Na720a5239e4d4f0aa806f731bfdb15d0
40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091160345
41 https://doi.org/10.1007/978-3-319-66402-6_20
42 schema:sdDatePublished 2022-01-01T19:09
43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
44 schema:sdPublisher N3e0584b59a104afeacc186e60f1606a1
45 schema:url https://doi.org/10.1007/978-3-319-66402-6_20
46 sgo:license sg:explorer/license/
47 sgo:sdDataset chapters
48 rdf:type schema:Chapter
49 N02d6f61687bd460c9b5d3d8930e8d442 rdf:first Na65b99b053734c94af919e1abf0ab746
50 rdf:rest N8247dd6fa6d94e5aaa45a29545dfcef8
51 N04506820ca9a45439998b4ba6a89fc8e schema:isbn 978-3-319-66401-9
52 978-3-319-66402-6
53 schema:name Computer Security – ESORICS 2017
54 rdf:type schema:Book
55 N12d35aab1dfc4a8eb6815873c3e16d36 schema:affiliation grid-institutes:grid.423851.9
56 schema:familyName Hugel
57 schema:givenName Rodolphe
58 rdf:type schema:Person
59 N1fb1427fed634a3f9fcb2c834c35f0ff rdf:first sg:person.015205413777.51
60 rdf:rest Ne12575ecd34f45c2a2ed77eae8589f61
61 N3e0584b59a104afeacc186e60f1606a1 schema:name Springer Nature - SN SciGraph project
62 rdf:type schema:Organization
63 N5989de08eef44881bf06f48f4876f8eb schema:name dimensions_id
64 schema:value pub.1091160345
65 rdf:type schema:PropertyValue
66 N7454559de190470c935fcd02f23bbf7b schema:familyName Gollmann
67 schema:givenName Dieter
68 rdf:type schema:Person
69 N8247dd6fa6d94e5aaa45a29545dfcef8 rdf:first N7454559de190470c935fcd02f23bbf7b
70 rdf:rest Ne84b1260f13a467e948326093df36b4a
71 N92639c7b56964dac9647f8a9879cb04f schema:familyName Snekkenes
72 schema:givenName Einar
73 rdf:type schema:Person
74 Na65b99b053734c94af919e1abf0ab746 schema:familyName Foley
75 schema:givenName Simon N.
76 rdf:type schema:Person
77 Na720a5239e4d4f0aa806f731bfdb15d0 schema:name Springer Nature
78 rdf:type schema:Organisation
79 Nb2624ee9235c4f63a780658c9533f510 schema:name doi
80 schema:value 10.1007/978-3-319-66402-6_20
81 rdf:type schema:PropertyValue
82 Ne12575ecd34f45c2a2ed77eae8589f61 rdf:first N12d35aab1dfc4a8eb6815873c3e16d36
83 rdf:rest Nf7979ee538a048bab639ea9f42a568d8
84 Ne84b1260f13a467e948326093df36b4a rdf:first N92639c7b56964dac9647f8a9879cb04f
85 rdf:rest rdf:nil
86 Nf7979ee538a048bab639ea9f42a568d8 rdf:first sg:person.016007512540.26
87 rdf:rest rdf:nil
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.015205413777.51 schema:affiliation grid-institutes:grid.463717.0
95 schema:familyName Chabanne
96 schema:givenName Hervé
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51
98 rdf:type schema:Person
99 sg:person.016007512540.26 schema:affiliation grid-institutes:grid.28848.3e
100 schema:familyName Keuffer
101 schema:givenName Julien
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016007512540.26
103 rdf:type schema:Person
104 grid-institutes:grid.28848.3e schema:alternateName Eurecom, Biot, France
105 schema:name Eurecom, Biot, France
106 Morpho, Issy-les-Moulineaux, France
107 rdf:type schema:Organization
108 grid-institutes:grid.423851.9 schema:alternateName Morpho, Issy-les-Moulineaux, France
109 schema:name Morpho, Issy-les-Moulineaux, France
110 rdf:type schema:Organization
111 grid-institutes:grid.463717.0 schema:alternateName Telecom ParisTech, Paris, France
112 schema:name Morpho, Issy-les-Moulineaux, France
113 Telecom ParisTech, Paris, France
114 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...