JOURNAL OF COMPUTERS (JCP)
ISSN : 1796-203X
Volume : 4 Issue : 1 Date : January 2009
Controlled Secret Leakage
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, and Qihan Luo
Full Text: PDF (139 KB)
Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how
and to what extent information about them is communicated to others. How to leak authoritative
secrets in an elegant way? The paper aims to solve this problem. The desired security properties i.
e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier
Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier
Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer-Verifiability are
specified in secret leakage. Based on Chow-Yiu-Hui’s ID-based ring signature scheme and
techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed.
The proposed scheme satisfies all specified security properties and can be used in trust
privacy, ring signature, authenticated encryption, zero-knowledge proof