Secret Handshakes from CA-Oblivious Encryption

Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Castelluccia, Claude, Jarecki, Stanisław, Tsudik, Gene
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 307
container_issue
container_start_page 293
container_title
container_volume 3329
creator Castelluccia, Claude
Jarecki, Stanisław
Tsudik, Gene
description Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders. The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.
doi_str_mv 10.1007/978-3-540-30539-2_21
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_16398420</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3088242_28_306</sourcerecordid><originalsourceid>FETCH-LOGICAL-c369t-40588ebbf7aebfc6aa2e06407ce5e5c05030174d1f330e3ee170b9a8e74bfb9b3</originalsourceid><addsrcrecordid>eNotkEtPAjEQx-szIPoNPHDxWGw73W17JATFhISDem7aMiursIvtYsK3tzzmMsn8H5n8CHnkbMQZU89GaQq0kIwCK8BQYQW_IHeQL8eDvCR9XnJOAaS5OgkCjCr0Nelni6BGSbglvUJxoUsle-QhpW92GKNBQ5-M3jFE7IYz1yzTyv1gGlax3QwnY7rw6_qvbndpOG1C3G-7um3uyU3l1gkfzntAPl-mH5MZnS9e3ybjOQ1Qmo5KVmiN3lfKoa9C6ZxAVkqmAhZYBFbk57iSS14BMARErpg3TqOSvvLGw4A8nXq3LgW3rqJrQp3sNtYbF_eWl2C0FCz7xMmXstR8YbS-bX-S5cweCNpM0ILNWOwRmD0QzCE4l8f2d4eps3hIBWy66NZh5bYdxpQTWguZE7mClfAPhpZuEg</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3088242_28_306</pqid></control><display><type>book_chapter</type><title>Secret Handshakes from CA-Oblivious Encryption</title><source>Springer Books</source><creator>Castelluccia, Claude ; Jarecki, Stanisław ; Tsudik, Gene</creator><contributor>Lee, Pil Joong ; Lee, Pil Joong</contributor><creatorcontrib>Castelluccia, Claude ; Jarecki, Stanisław ; Tsudik, Gene ; Lee, Pil Joong ; Lee, Pil Joong</creatorcontrib><description>Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders. The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540239758</identifier><identifier>ISBN: 9783540239758</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540305394</identifier><identifier>EISBN: 9783540305392</identifier><identifier>DOI: 10.1007/978-3-540-30539-2_21</identifier><identifier>OCLC: 57128674</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>anonymity ; Applied sciences ; authentication ; Computer science; control theory; systems ; Cryptography ; encryption ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; privacy ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Advances in Cryptology - ASIACRYPT 2004, 2004, Vol.3329, p.293-307</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c369t-40588ebbf7aebfc6aa2e06407ce5e5c05030174d1f330e3ee170b9a8e74bfb9b3</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3088242-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-30539-2_21$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-30539-2_21$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=16398420$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Lee, Pil Joong</contributor><contributor>Lee, Pil Joong</contributor><creatorcontrib>Castelluccia, Claude</creatorcontrib><creatorcontrib>Jarecki, Stanisław</creatorcontrib><creatorcontrib>Tsudik, Gene</creatorcontrib><title>Secret Handshakes from CA-Oblivious Encryption</title><title>Advances in Cryptology - ASIACRYPT 2004</title><description>Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders. The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.</description><subject>anonymity</subject><subject>Applied sciences</subject><subject>authentication</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>encryption</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>privacy</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540239758</isbn><isbn>9783540239758</isbn><isbn>3540305394</isbn><isbn>9783540305392</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2004</creationdate><recordtype>book_chapter</recordtype><recordid>eNotkEtPAjEQx-szIPoNPHDxWGw73W17JATFhISDem7aMiursIvtYsK3tzzmMsn8H5n8CHnkbMQZU89GaQq0kIwCK8BQYQW_IHeQL8eDvCR9XnJOAaS5OgkCjCr0Nelni6BGSbglvUJxoUsle-QhpW92GKNBQ5-M3jFE7IYz1yzTyv1gGlax3QwnY7rw6_qvbndpOG1C3G-7um3uyU3l1gkfzntAPl-mH5MZnS9e3ybjOQ1Qmo5KVmiN3lfKoa9C6ZxAVkqmAhZYBFbk57iSS14BMARErpg3TqOSvvLGw4A8nXq3LgW3rqJrQp3sNtYbF_eWl2C0FCz7xMmXstR8YbS-bX-S5cweCNpM0ILNWOwRmD0QzCE4l8f2d4eps3hIBWy66NZh5bYdxpQTWguZE7mClfAPhpZuEg</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Castelluccia, Claude</creator><creator>Jarecki, Stanisław</creator><creator>Tsudik, Gene</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Secret Handshakes from CA-Oblivious Encryption</title><author>Castelluccia, Claude ; Jarecki, Stanisław ; Tsudik, Gene</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c369t-40588ebbf7aebfc6aa2e06407ce5e5c05030174d1f330e3ee170b9a8e74bfb9b3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2004</creationdate><topic>anonymity</topic><topic>Applied sciences</topic><topic>authentication</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>encryption</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>privacy</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Castelluccia, Claude</creatorcontrib><creatorcontrib>Jarecki, Stanisław</creatorcontrib><creatorcontrib>Tsudik, Gene</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Castelluccia, Claude</au><au>Jarecki, Stanisław</au><au>Tsudik, Gene</au><au>Lee, Pil Joong</au><au>Lee, Pil Joong</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Secret Handshakes from CA-Oblivious Encryption</atitle><btitle>Advances in Cryptology - ASIACRYPT 2004</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3329</volume><spage>293</spage><epage>307</epage><pages>293-307</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540239758</isbn><isbn>9783540239758</isbn><eisbn>3540305394</eisbn><eisbn>9783540305392</eisbn><abstract>Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders. The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/978-3-540-30539-2_21</doi><oclcid>57128674</oclcid><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Advances in Cryptology - ASIACRYPT 2004, 2004, Vol.3329, p.293-307
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_16398420
source Springer Books
subjects anonymity
Applied sciences
authentication
Computer science
control theory
systems
Cryptography
encryption
Exact sciences and technology
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
privacy
Signal and communications theory
Software
Telecommunications and information theory
title Secret Handshakes from CA-Oblivious Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T21%3A36%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Secret%20Handshakes%20from%20CA-Oblivious%20Encryption&rft.btitle=Advances%20in%20Cryptology%20-%20ASIACRYPT%202004&rft.au=Castelluccia,%20Claude&rft.date=2004&rft.volume=3329&rft.spage=293&rft.epage=307&rft.pages=293-307&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540239758&rft.isbn_list=9783540239758&rft_id=info:doi/10.1007/978-3-540-30539-2_21&rft_dat=%3Cproquest_pasca%3EEBC3088242_28_306%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540305394&rft.eisbn_list=9783540305392&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3088242_28_306&rft_id=info:pmid/&rfr_iscdi=true