Information security — Redaction of authentic data —Part 2: Redactable signature schemes based on asymmetric mech...