Murdoch University Research Repository

Welcome to the Murdoch University Research Repository

The Murdoch University Research Repository is an open access digital collection of research
created by Murdoch University staff, researchers and postgraduate students.

Learn more

Controlled Secret Leakage

Cao, T., Huang, S., Cui, H.ORCID: 0000-0002-5820-2233, Wu, Y. and Luo, Q. (2007) Controlled Secret Leakage. In: 2007 International Conference on Computational Intelligence and Security (CIS 2007), 15 - 19 December 2007, Harbin, China

PDF - Published Version
Download (236kB) | Preview
Link to Published Version:
*Subscription may be required


How to leak authoritative secrets in an elegant way? The paper aims to solve this problem. The desired security properties i.e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer- Verifiability are specified in secret leakage. Based on Chow-Yiu-Hui's ID-based ring signature scheme and techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed. The proposed scheme satisfies all specified security properties and can be used in trust negotiation.

Item Type: Conference Paper
Item Control Page Item Control Page


Downloads per month over past year