Controlled Secret Leakage
Cao, T., Huang, S., Cui, H.ORCID: 0000-0002-5820-2233, Wu, Y. and Luo, Q.
(2007)
Controlled Secret Leakage.
In: 2007 International Conference on Computational Intelligence and Security (CIS 2007), 15 - 19 December 2007, Harbin, China
*Subscription may be required
Abstract
How to leak authoritative secrets in an elegant way? The paper aims to solve this problem. The desired security properties i.e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer- Verifiability are specified in secret leakage. Based on Chow-Yiu-Hui's ID-based ring signature scheme and techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed. The proposed scheme satisfies all specified security properties and can be used in trust negotiation.
Item Type: | Conference Paper |
---|---|
URI: | http://researchrepository.murdoch.edu.au/id/eprint/44113 |
![]() |
Item Control Page |
Downloads
Downloads per month over past year