Abstract
In a secret handshake protocol, an honest member in the group will never reveal his group affiliation unless the other party is a valid member of the same group. However, most prior work of secret handshake are for 2-party secret handshakes. Tsudik and Xu extended the notion of secret handshake to a multi-party setting in 2005. Unfortunately, this seminal work is rather inefficient, since they consider a generic construction of such a scheme. Following this work, Jarecki et al. proposed an efficient solution to multi-party secret handshake. The aim of this paper is twofold. Firstly, we show that Jarecki et al.’s scheme has some drawbacks and therefore the scheme does not fulfill the security requirements of secret handshake. Secondly, we present a new construction of the group secret handshake scheme. In a group secret handshake protocol, a valid member in the group should never reveals his group affiliation unless all the other parties are valid members of the same group. In other words, if a handshake among this group of parties fails, the identities of every involved parties will not be disclosed. We then show that our scheme is secure under the bilinear Diffie-Hellman assumption and decisional bilinear Diffie-Hellman assumption in the random oracle model.
Chapter PDF
Similar content being viewed by others
References
Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.: Secret Handshakes From Pairing-based Key Agreements. In: Proceedings of 2003 IEEE Symposium on Security and Privacy, pp. 180–196 (2003)
Boneh, D., Franklin, M.: Identity-based Encryption From the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret Handshakes From CA-Oblivious Encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293–307. Springer, Heidelberg (2004)
Li, N., Du, W., Boneh, D.: Oblivious Signature-based Envelope. In: Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing, pp. 182–189. ACM Press, New York (2003)
Vergnaud, D.: Rsa-based Secret Handshakes. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 252–274. Springer, Heidelberg (2006)
Zhou, L., Susilo, W., Mu, Y.: Three-round Secret Handshakes Based on ElGamal and DSA. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 332–342. Springer, Heidelberg (2006)
Nasserian, S., Tsudik, G.: Revisiting Oblivious Signature-based Envelopes. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 221–235. Springer, Heidelberg (2006)
Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: PODC 2005: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, pp. 39–39. ACM Press, New York (2005)
Tsudik, G., Xu, S.: Flexible Framework for Secret Handshakes (multi-party anonymous and un-observable authentication). Cryptology ePrint Archive, Report, /034, 2005 (2005), http://eprint.iacr.org/
Jarecki, S., Kim, J., Tsudik, G.: Authentication for paranoids: Multi-party secret handshakes. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 325–339. Springer, Heidelberg (2006)
Joux, A.: A one round protocol for tripartite diffie-hellman. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient Multi-Receiver Identity-based Encryption and Its Application to Broadcast Encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380–397. Springer, Heidelberg (2005)
Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 223–238. Springer, Heidelberg (2004)
Xu, S., Yung, M.: k-anonymous secret handshakes with reusable credent. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 158–167. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, L., Susilo, W., Mu, Y. (2007). New Construction of Group Secret Handshakes Based on Pairings. In: Qing, S., Imai, H., Wang, G. (eds) Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77048-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-77048-0_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77047-3
Online ISBN: 978-3-540-77048-0
eBook Packages: Computer ScienceComputer Science (R0)