Abstract
Secret handshake schemes allow mutually anonymous authentication between members of organizations. In this paper, a new unlinkable secret handshake scheme with dynamic matching is proposed (which is named USH-DM). Considering the existence of multiple different groups, the implementation of USH-DM achieves dynamic matching between members among completely different groups. In particular, USH-DM enhances the privacy of group members, which enables the transcripts of group members to remain unlinkable and untraceable. Without using the random oracle, USH-DM is proved secure by assuming the intractability of the decisional bilinear Diffie-Hellman and subgroup decision problems.
This work is supported by the Natural Science Foundation of China (No.61300204, 61100201), the Natural Science Foundation of Guangdong (No.S2012040006711), the Foundation for Distinguished Young Teachers in Higher Education of Guangdong (Yq2013051) and the Project of Science and Technology New Star of Guangzhou Pearl Rivel (2014J2200006).
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Ateniese, G., Blanton, M., Kirsch, J.: Secret handshakes with dynamic and fuzzy matching. In: Network and Distributed System Security Symposium, NDSS, pp. 159–177 (2007)
Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.: Secret handshakes from pairing-based key agreements. In: IEEE Symposium on Security and Privacy, pp. 180–196 (2003)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
Barreto, P.: The η T approach to the Tate pairing, and supporting (supersingular) elliptic curve arithmetic in characteristic 3, http://www.larc.usp.br/~pbarreto/Pairings.GPL.zip
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret handshakes from CA-oblivious encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293–307. Springer, Heidelberg (2004)
Gu, J., Xue, Z.: An improved efficient secret handshakes scheme with unlinkability. IEEE Communications Letters 15(2), 486–490 (2011)
Huang, H., Cao, Z.: A novel and efficient unlinkable secret handshake scheme. IEEE Communications Letters 13(5), 363–365 (2009)
Jarecki, S., Liu, X.: Unlinkable secret handshakes and key-private group key management schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270–287. Springer, Heidelberg (2007)
Jarecki, S., Liu, X.: Private mutual authentication and conditional oblivious transfer. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 90–107. Springer, Heidelberg (2009)
Kawai, Y., Yoneyama, K., Ohta, K.: Secret handshake: strong anonymity definition and construction. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 219–229. Springer, Heidelberg (2009)
Li, S., Ephremides, A.: Anonymous routing: a cross-layer coupling between application and network layer. In: Conference on Information Science and Systems, CISS, pp. 783–788 (2006)
Nasserian, S., Tsudik, G.: Revisiting oblivious signature-based envelopes. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 221–235. Springer, Heidelberg (2006)
Sorniotti, A., Molva, R.: Secret handshakes with revocation support. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 274–299. Springer, Heidelberg (2010)
Sorniotti, A., Molva, R.: Secret interest groups (SIGs) in social networks with an implementation on Facebook. In: SAC 2010, pp. 621–628. ACM Press (2010)
Sorniotti, A., Molva, R.: Federated secret handshakes with support for revocation. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 218–234. Springer, Heidelberg (2010)
Sorniotti, A., Molva, R.: A provably secure secret handshake with dynamic controlled matching. Computers & Security 29(5), 619–627 (2010)
Su, R.: On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Communications Letters 13(9), 712–713 (2009)
Vergnaud, D.: RSA-based secret handshakes. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 252–274. Springer, Heidelberg (2006)
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1–15. Springer, Heidelberg (2007)
Wen, Y., Zhang, F., Xu, L.: Unlinkable secret handshakes from message recovery signature. Chinese Journal of Electronics 19(4), 705–709 (2010)
Wen, Y., Zhang, F.: A new revocable secret handshake scheme with backward unlinkability. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 17–30. Springer, Heidelberg (2011)
Zhang, F., Chen, X., Susilo, W., Mu, Y.: A new signature scheme without random oracles from bilinear pairings. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 67–80. Springer, Heidelberg (2006)
Xu, S., Yung, M.: K-anonymous secret handshakes with reusable without random oracles from bilinear pairings. In: ACM CCS 2004, pp. 158–167. ACM (2004)
Zhao, G., Tan, C., Ren, Y., Fang, L.: An efficient unlinkable secret handshake protocol without ROM. In: IEEE International Conference on WCNIS 2010, pp. 486–490 (2010)
Zhou, L., Susilo, W., Mu, Y.: Three-round secret handshakes based on ElGamal and DSA. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 332–342. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Wen, Y., Gong, Z. (2014). A Dynamic Matching Secret Handshake Scheme without Random Oracles. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_31
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)