{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T04:27:50Z","timestamp":1741926470810,"version":"3.38.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11623-011-0181-0","type":"journal-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T12:43:32Z","timestamp":1320410612000},"page":"757-762","source":"Crossref","is-referenced-by-count":2,"title":["Redigierbare Digitale Signaturen"],"prefix":"10.1007","volume":"35","author":[{"given":"Daniel","family":"Slamanig","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Rass","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,5]]},"reference":[{"key":"181_CR1","unstructured":"J. Buchmann, C. Coronado, M. D\u00f6ring, et al. Post-Quantum Signatures. Crypt. ePrint Archive, Report 2004\/297, http:\/\/eprint.iacr.org\/"},{"key":"181_CR2","unstructured":"D. Slamanig, C. Stingl. Spezielle Signaturvarianten und Anwendungsbereiche. DACH-Security, S. 408\u2013419. syssec, 2009."},{"key":"181_CR3","first-page":"285","volume":"2288","author":"R. Steinfeld","year":"2001","unstructured":"R. Steinfeld, L. Bull und Y. Zheng: Content Extraction Signatures. ICISC, LNCS 2288, S. 285\u2013304. Springer, 2001.","journal-title":"ICISC, LNCS"},{"key":"181_CR4","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology \u2014 CT-RSA 2002","author":"Robert Johnson","year":"2002","unstructured":"R. Johnson, D. Molnar, D. X. Song und D. Wagner. Homomorphic Signature Schemes. CTRSA, LNCS 2271, S. 244\u2013262. Springer, 2002."},{"key":"181_CR5","doi-asserted-by":"crossref","unstructured":"R. C. Merkle. A Digital Signature Based on a Conventional Encryption Function. CRYPTO, LNCS 293, S. 369\u2013378. Springer, 1987.","DOI":"10.1007\/3-540-48184-2_32"},{"issue":"4","key":"181_CR6","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser und S. Micali: How to construct random functions. J. ACM 33(4), S. 792\u2013807. ACM, 1986.","journal-title":"J. ACM"},{"key":"181_CR7","doi-asserted-by":"crossref","unstructured":"D. Slamanig und S. Rass. Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. CMS, LNCS 6109, S. 201\u2013213. Springer, 2010.","DOI":"10.1007\/978-3-642-13241-4_19"},{"key":"181_CR8","doi-asserted-by":"crossref","unstructured":"C. Brzuska, H. Busch, et al. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS, LNCS 6123, S. 87\u2013104. Springer, 2010.","DOI":"10.1007\/978-3-642-13708-2_6"},{"key":"181_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-00862-7_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"Ee-Chien Chang","year":"2009","unstructured":"E.-C. Chang, C. L. Lim und J. Xu. Short Redactable Signatures Using Random Trees. CT-RSA, LNCS 5473, S. 133\u2013147. Springer, 2009."},{"issue":"1","key":"181_CR10","first-page":"138","volume":"1","author":"A. Kundu","year":"2008","unstructured":"A. Kundu und E. Bertino. Structural signatures for Tree Data Structures. PVLDB 1(1), S. 138\u2013150. 2008","journal-title":"PVLDB"},{"key":"181_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security \u2013 ESORICS 2005","author":"Giuseppe Ateniese","year":"2005","unstructured":"G. Ateniese, D. H. Chou, B. de Medeiros und G. Tsudik. Sanitizable Signatures. ESORICS, LNCS 3679, S. 159\u2013177. Springer, 2005."},{"key":"181_CR12","doi-asserted-by":"crossref","unstructured":"M. Klonowski und A. Lauks. Extended Sanitizable Signatures. ICISC, LNCS 4296, S. 343\u2013355. Springer, 2006.","DOI":"10.1007\/11927587_28"},{"key":"181_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-11925-5_13","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"S\u00e9bastien Canard","year":"2010","unstructured":"S. Canard und A. Jambert. On Extended Sanitizable Signature Schemes. CT-RSA, LNCS 5985, S. 179\u2013194. Springer, 2010."},{"key":"181_CR14","doi-asserted-by":"crossref","unstructured":"C. Brzuska, M. Fischlin, A. Lehmann und D. Schr\u00f6der. Unlinkability of Sanitizable Signatures. Public Key Cryptography, LNCS 6056, S. 444\u2013461. Springer, 2010.","DOI":"10.1007\/978-3-642-13013-7_26"},{"key":"181_CR15","doi-asserted-by":"crossref","unstructured":"C. Brzuska, M. Fischlin, et al. Security of Sanitizable Signatures Revisited. Public Key Cryptography, LNCS 5443, S. 317\u2013336. Springer, 2009.","DOI":"10.1007\/978-3-642-00468-1_18"},{"key":"181_CR16","doi-asserted-by":"crossref","unstructured":"S. Canard, F. Laguillaumie und M. Milhau. Trapdoor Sanitizable Signatures and Their Application to Content Protection. ACNS, LNCS 5037, S. 258\u2013276. Springer, 2008.","DOI":"10.1007\/978-3-540-68914-0_16"},{"key":"181_CR17","doi-asserted-by":"crossref","unstructured":"S. Haber, Y. Hatano, et al. Efficient signature schemes supporting redaction, pseudonymmization, and data identification. ASIACCS, S. 353\u2013362. ACM, 2008.","DOI":"10.1145\/1368310.1368362"},{"key":"181_CR18","unstructured":"MedVault: Ensuring Security & Privacy for Medical Data. http:\/\/medvault.gtisc.gatech.edu\/"},{"key":"181_CR19","doi-asserted-by":"crossref","unstructured":"D. Slfamanig und C. Stingl. k-Anonymity in Context of Digitally Signed CDA Documents. HEALTHINF, S. 62\u201369. INSTICC Press, 2010.","DOI":"10.5220\/0002731700620069"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0181-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0181-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0181-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0181-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T19:57:19Z","timestamp":1741895839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0181-0"}},"subtitle":["Theorie und Praxis"],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":19,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["181"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0181-0","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}