The Matter Of Privacy
Note: Please refer acronym list.
6. The Matter Of Privacy
6.1. Privacy: What is it?
6.2. How is Privacy Assured?
Privacy is in the matter to determine the right-to-know and the need-to-know, as well as the matter to determine who to trust and how to trust. The crux of utility and application is in the matter of proof, with the consideration of privacy, and yet the matter of proof that privacy is assured.
As all proofs are based on Assertions, how would security solutions architects assured A6?
Multi-Signatures or Threshold Signatures
Multi-signature (Itakura and Nakamura, 1983) schemes reveal data only when certain conditions are met, i.e. an adequate number of entities (e.g., k of N, where k may be 3, N may be 5) authorize. Another option may be threshold signature or presentation, e.g. Schnorr signature, SSS (Shamir Secret sharing (1979)). """ Schnorr signature method to aggregate signers (secp256k1)
G := base point on the curve.[Sign]
A takes his private key, a random value (r_i) and a message (M), and produces a signature: (R,s ). < Keys generation >:
1. A generates private key of (x_1) and a public key (X_1):
X_1 = x_1 * G2. B generates private key (x_2) and a public key (X_2):
X_2 = x_2 * G