{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T12:08:21Z","timestamp":1753877301140,"version":"3.41.2"},"reference-count":33,"publisher":"Oxford University Press (OUP)","issue":"5","license":[{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Logical investigations of the notion of secrecy are typically concentrated on tools for deducing whether private information is well hidden from unauthorized, direct, or indirect access attempts. This paper proposes a multi-agent, normal multi-modal logic to capture salient features of secrecy\u2019s intentions. Specifically, we focus on the intentions, beliefs and knowledge of secret keepers and, more generally, of all the actors involved in secret-keeping scenarios. In particular, we investigate intentions underlying the keeping of a true secret, namely a secret concerning information known (and so true) by the secret keeper. The resulting characterization of intending to keep a true secret provides valuable insights into conditions ensuring or undermining secrecy depending on agents\u2019 attitudes and links between secrets and their surrounding context. We present the proposed logical system\u2019s soundness, completeness and decidability results. Furthermore, we outline some theorems with potential applications to several fields, e.g. computer science and the social sciences.<\/jats:p>","DOI":"10.1093\/logcom\/exaf028","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T07:39:18Z","timestamp":1750059558000},"source":"Crossref","is-referenced-by-count":0,"title":["A logical perspective on intending to keep a true secret"],"prefix":"10.1093","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7250-5011","authenticated-orcid":false,"given":"Alessandro","family":"Aldini","sequence":"first","affiliation":[{"name":"Department of Pure and Applied Sciences , University of Urbino Carlo Bo, Via Aurelio Saffi, n. 2, 61029, Urbino (PU),","place":["Italy"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8136-732X","authenticated-orcid":false,"given":"Davide","family":"Fazio","sequence":"additional","affiliation":[{"name":"Department of Communication Sciences , University of Teramo, Via R. Balzarini, n. 1, 64100, Teramo (TE),","place":["Italy"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8828-8920","authenticated-orcid":false,"given":"Pierluigi","family":"Graziani","sequence":"additional","affiliation":[{"name":"Department of Pure and Applied Sciences , University of Urbino Carlo Bo, Via Aurelio Saffi, n. 2, 61029, Urbino (PU),","place":["Italy"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1305-7853","authenticated-orcid":false,"given":"Raffaele","family":"Mascella","sequence":"additional","affiliation":[{"name":"Department of Communication Sciences , University of Teramo, Via R. Balzarini, n. 1, 64100, Teramo (TE),","place":["Italy"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3875-0512","authenticated-orcid":false,"given":"Mirko","family":"Tagliaferri","sequence":"additional","affiliation":[{"name":"Department of Pure and Applied Sciences , University of Urbino Carlo Bo, Via Aurelio Saffi, n. 2, 61029, Urbino (PU),","place":["Italy"]}]}],"member":"286","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"2025061603391361400_ref1","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijar.2024.109167","article-title":"A probabilistic modal logic for context-aware trust based on evidence","volume":"169","author":"Aldini","year":"2024","journal-title":"International Journal of Approximate Reasoning"},{"key":"2025061603391361400_ref2","first-page":"2025","article-title":"On group secrets and the metacommunicative aspects of revealing a true secret","volume-title":"Software Engineering and Formal Methods. SEFM 2024 Collocated Workshops","author":"Aldini"},{"key":"2025061603391361400_ref3","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-030-67220-1_17","article-title":"Reasoning about ignorance and beliefs","volume-title":"Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops, LNCS 12524","author":"Aldini","year":"2021"},{"key":"2025061603391361400_ref4","first-page":"373","article-title":"A hierarchical characterization of ignorance in epistemic logic","volume":"8","author":"Aldini","year":"2023","journal-title":"Argumenta"},{"key":"2025061603391361400_ref5","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/978-3-030-86772-0_41","article-title":"Trust evidence logic","volume-title":"Symbolic and Quantitative Approaches to Reasoning with Uncertainty: 16th European Conference (ECSQARU 2021), vol. 12897 of LNAI","author":"Aldini","year":"2021"},{"key":"2025061603391361400_ref6","first-page":"571","article-title":"A taxonomy of computational models for trust computing in decision-making procedures","volume-title":"European Conference on Information Warfare and Security","author":"Aldini","year":"2018"},{"volume-title":"The Psychology of Secrets","author":"Anita Kelly","key":"2025061603391361400_ref7"},{"key":"2025061603391361400_ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF02127445","article-title":"The paradox of secrecy","volume":"4","author":"Bellman","year":"1981","journal-title":"Human Studies"},{"key":"2025061603391361400_ref9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.artint.2003.02.001","article-title":"A unifying semantics for time and events","volume":"153","author":"Bennett","year":"2004","journal-title":"Artificial Intelligence"},{"volume-title":"Modal Logic","author":"Blackburn","key":"2025061603391361400_ref10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107050884"},{"key":"2025061603391361400_ref11","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/S0165-4896(97)00014-0","article-title":"A modal logic of intentional communication","volume":"38","author":"Colombetti","year":"1999","journal-title":"Mathematical Social Sciences"},{"key":"2025061603391361400_ref12","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2307\/2271594","article-title":"A logical analysis of some value concepts","volume":"28","author":"Fitch","year":"1963","journal-title":"Journal of Symbolic Logic"},{"key":"2025061603391361400_ref13","first-page":"216","article-title":"A modal deconstruction of access control logics","volume-title":"Foundations of Software Science and Computational Structures (FoSSaCS 2008)","author":"Garg","year":"2008"},{"key":"2025061603391361400_ref14","first-page":"114","article-title":"Modal access control logic - axiomatization, semantics and FOL theorem proving","volume-title":"STAIRS 2010 - Proceedings of the Fifth Starting AI Researchers\u2019 Symposium, vol. 222 of Frontiers in Artificial Intelligence and Applications","author":"Genovese","year":"2010"},{"key":"2025061603391361400_ref15","first-page":"11","article-title":"Security policies and security models","volume-title":"IEEE Symposium on Security and Privacy","author":"Goguen","year":"1982"},{"key":"2025061603391361400_ref16","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1137\/0218012","article-title":"The knowledge complexity of interactive proof systems","volume":"18","author":"Goldwasser","year":"1989","journal-title":"SIAM Journal on Computing"},{"key":"2025061603391361400_ref17","first-page":"119","volume":"8","author":"Goranko","year":"2021","journal-title":"On relative ignorance. Filosofiska Notiser"},{"key":"2025061603391361400_ref18","first-page":"1","article-title":"Secrecy in multiagent systems. ACM Transactions on Information System","volume":"12","author":"Halpern","year":"2008","journal-title":"Security"},{"volume-title":"Knowledge and Belief: An Introduction to the Logic of the Two Notions","year":"1962","author":"Hintikka","key":"2025061603391361400_ref19"},{"volume-title":"A Companion to Modal Logic","year":"1984","author":"Hughes","key":"2025061603391361400_ref20"},{"key":"2025061603391361400_ref21","first-page":"77","article-title":"A commonsense theory of secrets","volume-title":"Formal Ontology in Information Systems - Proceedings of the 11th International Conference, FOIS 2020, vol. 330 of Frontiers in Artificial Intelligence and Applications","author":"Ismail","year":"2020"},{"key":"2025061603391361400_ref22","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11229-008-9309-7","article-title":"A logic of intention and attempt","volume":"163","author":"Lorini","year":"2008","journal-title":"Synthese"},{"key":"2025061603391361400_ref23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3289255","article-title":"Alpha-Beta privacy","volume":"22","author":"M\u00f6dersheim","year":"2019","journal-title":"ACM Transactions on Privacy and Security"},{"journal-title":"The New York Times","article-title":"Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes","author":"Popper","key":"2025061603391361400_ref24"},{"key":"2025061603391361400_ref25","article-title":"Epistemic logic","volume-title":"The Stanford Encyclopedia of Philosophy","author":"Rendsvig","year":"2024"},{"volume-title":"The Secret Life of Secrets: How our Inner Worlds Shape Well-Being, Relationships, and Who we Are","year":"2022","author":"Slepian","key":"2025061603391361400_ref26"},{"key":"2025061603391361400_ref27","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1037\/rev0000282","article-title":"A process model of having and keeping secrets","volume":"129","author":"Slepian","year":"2022","journal-title":"Psychological Review"},{"key":"2025061603391361400_ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/pspa0000085","article-title":"The experience of secrecy","volume":"113","author":"Slepian","year":"2017","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025061603391361400_ref29","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-031-26236-4_31","article-title":"Using justified true beliefs to explore formal ignorance","volume-title":"Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops","author":"Tagliaferri","year":"2023"},{"key":"2025061603391361400_ref30","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1093\/logcom\/exac016","article-title":"From belief to trust: a quantitative framework based on modal logic","volume":"32","author":"Tagliaferri","year":"2022","journal-title":"Journal of Logic and Computation"},{"key":"2025061603391361400_ref31","first-page":"1115","article-title":"A logic of revelation and concealment","volume-title":"Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, AAMAS\u201912","author":"van der Hoek","year":"2012"},{"key":"2025061603391361400_ref32","first-page":"19","article-title":"Figure della reticenza. Riservatezza, segreto, pudore, privacy, silenzio, sacro, storytelling","volume":"130","author":"Volli","year":"2020","journal-title":"Versus, quaderni di studi semiotici"},{"key":"2025061603391361400_ref33","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s10472-022-09815-0","article-title":"The logic of secrets and the interpolation rule","volume":"91","author":"Xiong","year":"2023","journal-title":"Annals of Mathematics and Artificial Intelligence"}],"container-title":["Journal of Logic and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/logcom\/article-pdf\/35\/5\/exaf028\/63496530\/exaf028.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/logcom\/article-pdf\/35\/5\/exaf028\/63496530\/exaf028.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T07:39:30Z","timestamp":1750059570000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/logcom\/article\/doi\/10.1093\/logcom\/exaf028\/8163465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,6,11]]}},"URL":"https:\/\/doi.org\/10.1093\/logcom\/exaf028","relation":{},"ISSN":["0955-792X","1465-363X"],"issn-type":[{"type":"print","value":"0955-792X"},{"type":"electronic","value":"1465-363X"}],"subject":[],"published-other":{"date-parts":[[2025,7]]},"published":{"date-parts":[[2025,6,11]]},"article-number":"exaf028"}}