Catalog Home Page

Controlled Secret Leakage

Cao, T., Huang, S., Cui, H.ORCID: 0000-0002-5820-2233, Wu, Y. and Luo, Q. (2007) Controlled Secret Leakage. In: 2007 International Conference on Computational Intelligence and Security (CIS 2007), 15 - 19 December 2007, Harbin, China

[img]
Preview
PDF - Published Version
Download (236kB) | Preview
Link to Published Version: https://doi.org/10.1109/CIS.2007.79
*Subscription may be required

Abstract

How to leak authoritative secrets in an elegant way? The paper aims to solve this problem. The desired security properties i.e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer- Verifiability are specified in secret leakage. Based on Chow-Yiu-Hui's ID-based ring signature scheme and techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed. The proposed scheme satisfies all specified security properties and can be used in trust negotiation.

Item Type: Conference Paper
URI: http://researchrepository.murdoch.edu.au/id/eprint/44113
Item Control Page Item Control Page

Downloads

Downloads per month over past year