Logo Goletty

Controlled Secret Leakage
Journal Title Journal of Computers
Journal Abbreviation jcp
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (142 kb)
   
Title Controlled Secret Leakage
Authors Luo, Qihan; Wu, Yipeng; Cui, Hui; Huang, Shi; Cao, Tianjie
Abstract Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to leak authoritative secrets in an elegant way? The paper aims to solve this problem. The desired security properties i. e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer-Verifiability are specified in secret leakage. Based on Chow-Yiu-Hui’s ID-based ring signature scheme and techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed. The proposed scheme satisfies all specified security properties and can be used in trust negotiation.
Publisher ACADEMY PUBLISHER
Date 2009-01-01
Source Journal of Computers Vol 4, No 1 (2009): Special Issue: Recent Advances in Information Technology and Security - Track o
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html.

 

See other article in the same Issue


Goletty © 2024