Efficient identification and signatures for smart cards
CRYPTO '89 Proceedings on Advances in cryptology
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Brief announcement: secret handshakes from CA-oblivious encryption
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
k-anonymous secret handshakes with reusable credentials
Proceedings of the 11th ACM conference on Computer and communications security
Brief announcement: a flexible framework for secret handshakes
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Revisiting oblivious signature-based envelopes
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Information Security Applications
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
New construction of group secret handshakes based on pairings
ICICS'07 Proceedings of the 9th international conference on Information and communications security
K-anonymous multi-party secret handshakes
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Taming big brother ambitions: more privacy for secret handshakes
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Federated secret handshakes with support for revocation
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Affiliation-hiding authentication with minimal bandwidth consumption
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Secret handshakes from ID-based message recovery signatures: A new generic approach
Computers and Electrical Engineering
Group secret handshakes or affiliation-hiding authenticated group key agreement
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Secret handshake scheme with request-based-revealing
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Secret handshake scheme with request-based-revealing
Computers & Mathematics with Applications
Private mutual authentications with fuzzy matching
International Journal of High Performance Systems Architecture
Hi-index | 0.00 |
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to traditional security tools such as authentication and key distribution protocols. A secret handshake protocol allow members of the same group to authenticate each other secretly, meaning that a non-member cannot determine, even by engaging someone in a protocol, whether that party is a member of the group. Whereas, parties who are members of the same group recognize each other as members, and can establish authenticated secret keys with each other. Thus, a secret handshake protocol offers privacy-preserving authentication and can be used whenever group members need to identify and securely communicate with each other without being observed or detected. Most prior work in secret handshake protocols considered 2-party scenarios. In this paper we propose formal definitions of multi-party secret handshakes, and we develop a practical and provably secure multi-party secret handshake scheme by blending Schnorr-signature based 2-party secret handshake protocol of Castelluccia et al. [5] with a group key agreement protocol of Burmester and Desmedt [4]. The resulting scheme achieves very strong privacy properties, is as efficient as the (non-private) authenticated version of the Burmester-Desmedt protocol [4, 6], but requires a supply of one-time certificates for each group member.