Title : 
Controlled Secret Leakage
         
        
            Author : 
Cao, Tianjie ; Huang, Shi ; Cui, Hui ; Wu, Yipeng ; Luo, Qihan
         
        
        
        
        
        
            Abstract : 
How to leak authoritative secrets in an elegant way? The paper aims to solve this problem. The desired security properties i.e. Semantic-Security; Recipient-Designation; Verification-Dependence; Designated-Verifier Signature-Verifiability; Public Signature-Verifiability; Recipient-Ambiguity; Designated-Verifier Recipient-Verifiability; Public Recipient-Verifiability; Signer-Ambiguity; Signer- Verifiability are specified in secret leakage. Based on Chow-Yiu-Hui´s ID-based ring signature scheme and techniques of zero-knowledge proof, an ID-based controlled secret leakage scheme is proposed. The proposed scheme satisfies all specified security properties and can be used in trust negotiation.
         
        
            Keywords : 
Computational intelligence; Computer security; Electronic commerce; Identity-based encryption; Legislation; Privacy; Protection; Protocols; Public key; Public key cryptography;
         
        
        
        
            Conference_Titel : 
Computational Intelligence and Security, 2007 International Conference on
         
        
            Conference_Location : 
Harbin, China
         
        
            Print_ISBN : 
0-7695-3072-9
         
        
            Electronic_ISBN : 
978-0-7695-3072-7
         
        
        
            DOI : 
10.1109/CIS.2007.79