Controlled Secret Leakage
- Resource Type
- Conference
- Authors
- Cao, Tianjie; Huang, Shi; Cui, Hui; Wu, Yipeng; Luo, Qihan
- Source
- 2007 International Conference on Computational Intelligence and Security (CIS 2007) Computational Intelligence and Security, 2007 International Conference on. :868-872 Dec, 2007
- Subject
- Communication, Networking and Broadcast Technologies
Computing and Processing
Signal Processing and Analysis
Privacy
Identity-based encryption
Protection
Protocols
Public key cryptography
Public key
Legislation
Computational intelligence
Computer security
Electronic commerce
- Language
How to leak authoritative secrets in an elegant way? The paper aims to solve this problem. The desired security properties i.e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer- Verifiability are specified in secret leakage. Based on Chow-Yiu-Hui's ID-based ring signature scheme and techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed. The proposed scheme satisfies all specified security properties and can be used in trust negotiation.