Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 307 |
---|---|
container_issue | |
container_start_page | 293 |
container_title | |
container_volume | 3329 |
creator | Castelluccia, Claude Jarecki, Stanisław Tsudik, Gene |
description | Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders.
The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally. |
doi_str_mv | 10.1007/978-3-540-30539-2_21 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_16398420</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3088242_28_306</sourcerecordid><originalsourceid>FETCH-LOGICAL-c369t-40588ebbf7aebfc6aa2e06407ce5e5c05030174d1f330e3ee170b9a8e74bfb9b3</originalsourceid><addsrcrecordid>eNotkEtPAjEQx-szIPoNPHDxWGw73W17JATFhISDem7aMiursIvtYsK3tzzmMsn8H5n8CHnkbMQZU89GaQq0kIwCK8BQYQW_IHeQL8eDvCR9XnJOAaS5OgkCjCr0Nelni6BGSbglvUJxoUsle-QhpW92GKNBQ5-M3jFE7IYz1yzTyv1gGlax3QwnY7rw6_qvbndpOG1C3G-7um3uyU3l1gkfzntAPl-mH5MZnS9e3ybjOQ1Qmo5KVmiN3lfKoa9C6ZxAVkqmAhZYBFbk57iSS14BMARErpg3TqOSvvLGw4A8nXq3LgW3rqJrQp3sNtYbF_eWl2C0FCz7xMmXstR8YbS-bX-S5cweCNpM0ILNWOwRmD0QzCE4l8f2d4eps3hIBWy66NZh5bYdxpQTWguZE7mClfAPhpZuEg</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3088242_28_306</pqid></control><display><type>book_chapter</type><title>Secret Handshakes from CA-Oblivious Encryption</title><source>Springer Books</source><creator>Castelluccia, Claude ; Jarecki, Stanisław ; Tsudik, Gene</creator><contributor>Lee, Pil Joong ; Lee, Pil Joong</contributor><creatorcontrib>Castelluccia, Claude ; Jarecki, Stanisław ; Tsudik, Gene ; Lee, Pil Joong ; Lee, Pil Joong</creatorcontrib><description>Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders.
The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540239758</identifier><identifier>ISBN: 9783540239758</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540305394</identifier><identifier>EISBN: 9783540305392</identifier><identifier>DOI: 10.1007/978-3-540-30539-2_21</identifier><identifier>OCLC: 57128674</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>anonymity ; Applied sciences ; authentication ; Computer science; control theory; systems ; Cryptography ; encryption ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; privacy ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Advances in Cryptology - ASIACRYPT 2004, 2004, Vol.3329, p.293-307</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c369t-40588ebbf7aebfc6aa2e06407ce5e5c05030174d1f330e3ee170b9a8e74bfb9b3</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3088242-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-30539-2_21$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-30539-2_21$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16398420$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Lee, Pil Joong</contributor><contributor>Lee, Pil Joong</contributor><creatorcontrib>Castelluccia, Claude</creatorcontrib><creatorcontrib>Jarecki, Stanisław</creatorcontrib><creatorcontrib>Tsudik, Gene</creatorcontrib><title>Secret Handshakes from CA-Oblivious Encryption</title><title>Advances in Cryptology - ASIACRYPT 2004</title><description>Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders.
The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.</description><subject>anonymity</subject><subject>Applied sciences</subject><subject>authentication</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>encryption</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>privacy</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540239758</isbn><isbn>9783540239758</isbn><isbn>3540305394</isbn><isbn>9783540305392</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2004</creationdate><recordtype>book_chapter</recordtype><recordid>eNotkEtPAjEQx-szIPoNPHDxWGw73W17JATFhISDem7aMiursIvtYsK3tzzmMsn8H5n8CHnkbMQZU89GaQq0kIwCK8BQYQW_IHeQL8eDvCR9XnJOAaS5OgkCjCr0Nelni6BGSbglvUJxoUsle-QhpW92GKNBQ5-M3jFE7IYz1yzTyv1gGlax3QwnY7rw6_qvbndpOG1C3G-7um3uyU3l1gkfzntAPl-mH5MZnS9e3ybjOQ1Qmo5KVmiN3lfKoa9C6ZxAVkqmAhZYBFbk57iSS14BMARErpg3TqOSvvLGw4A8nXq3LgW3rqJrQp3sNtYbF_eWl2C0FCz7xMmXstR8YbS-bX-S5cweCNpM0ILNWOwRmD0QzCE4l8f2d4eps3hIBWy66NZh5bYdxpQTWguZE7mClfAPhpZuEg</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Castelluccia, Claude</creator><creator>Jarecki, Stanisław</creator><creator>Tsudik, Gene</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Secret Handshakes from CA-Oblivious Encryption</title><author>Castelluccia, Claude ; Jarecki, Stanisław ; Tsudik, Gene</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c369t-40588ebbf7aebfc6aa2e06407ce5e5c05030174d1f330e3ee170b9a8e74bfb9b3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2004</creationdate><topic>anonymity</topic><topic>Applied sciences</topic><topic>authentication</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>encryption</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>privacy</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Castelluccia, Claude</creatorcontrib><creatorcontrib>Jarecki, Stanisław</creatorcontrib><creatorcontrib>Tsudik, Gene</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Castelluccia, Claude</au><au>Jarecki, Stanisław</au><au>Tsudik, Gene</au><au>Lee, Pil Joong</au><au>Lee, Pil Joong</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Secret Handshakes from CA-Oblivious Encryption</atitle><btitle>Advances in Cryptology - ASIACRYPT 2004</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3329</volume><spage>293</spage><epage>307</epage><pages>293-307</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540239758</isbn><isbn>9783540239758</isbn><eisbn>3540305394</eisbn><eisbn>9783540305392</eisbn><abstract>Secret handshakes were recently introduced [BDS + 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders.
The work of [BDS + 03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS + 03] scheme, but it is about twice cheaper computationally.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/978-3-540-30539-2_21</doi><oclcid>57128674</oclcid><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Advances in Cryptology - ASIACRYPT 2004, 2004, Vol.3329, p.293-307 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_16398420 |
source | Springer Books |
subjects | anonymity Applied sciences authentication Computer science control theory systems Cryptography encryption Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing privacy Signal and communications theory Software Telecommunications and information theory |
title | Secret Handshakes from CA-Oblivious Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T21%3A36%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Secret%20Handshakes%20from%20CA-Oblivious%20Encryption&rft.btitle=Advances%20in%20Cryptology%20-%20ASIACRYPT%202004&rft.au=Castelluccia,%20Claude&rft.date=2004&rft.volume=3329&rft.spage=293&rft.epage=307&rft.pages=293-307&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540239758&rft.isbn_list=9783540239758&rft_id=info:doi/10.1007/978-3-540-30539-2_21&rft_dat=%3Cproquest_pasca%3EEBC3088242_28_306%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540305394&rft.eisbn_list=9783540305392&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3088242_28_306&rft_id=info:pmid/&rfr_iscdi=true |