Advertisement

A Flexible Framework for Secret Handshakes

Multi-party Anonymous and Un-observable Authentication
  • Gene Tsudik
  • Shouhuai Xu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4258)

Abstract

In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are becoming very important. This motivates research in cryptographic techniques offering built-in privacy. A secret handshake is a protocol whereby participants establish a secure, anonymous and unobservable communication channel only if they are members of the same group. This type of “private” authentication is a valuable tool in the arsenal of privacy-preserving cryptographic techniques. Prior research focused on 2-party secret handshakes with one-time credentials.

This paper breaks new ground on two accounts: (1) it shows how to obtain secure and efficient secret handshakes with reusable credentials, and (2) it represents the first treatment of group (or multi-party) secret handshakes, thus providing a natural extension to the secret handshake technology. An interesting new issue encountered in multi-party secret handshakes is the need to ensure that all parties are indeed distinct. (This is a real challenge since the parties cannot expose their identities.) We tackle this and other challenging issues in constructing GCD – a flexible framework for secret handshakes. The proposed GCD framework lends itself to many practical instantiations and offers several novel and appealing features such as self-distinction and strong anonymity with reusable credentials. In addition to describing the motivation and step-by-step construction of the framework, this paper provides a thorough security analysis and illustrates two concrete framework instantiations.

Keywords

secret handshakes privacy-preservation anonymity credential systems unobservability key management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Tsudik, G.: Some Open Issues and New Directions in Group Signatures. In: Financial Cryptography. LNCS, vol. 1880, Springer, Heidelberg (1999)Google Scholar
  3. 3.
    Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.: Secret handshakes from pairing-based key agreements. In: 24th IEEE Symposium on Security and Privacy (May 2003)Google Scholar
  4. 4.
    Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614–629. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. 6.
    Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, Fairfax, pp. 62–73. ACM Press, New York (1993)CrossRefGoogle Scholar
  7. 7.
    Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Cryptology ePrint Archive, Report 2004/077 (2004), http://eprint.iacr.org/
  8. 8.
    Boyd, C., Mao, W., Paterson, K.: Deniable authenticated key establishment for internet protocolsGoogle Scholar
  9. 9.
    Bradshaw, R., Holt, J., Seamons, K.: Concealing complex policies with hidden credentials. In: Proceedings of the 11th ACM conference on Computer and communications security (CCS 2004), pp. 146–157. ACM Press, New York (2004)CrossRefGoogle Scholar
  10. 10.
    Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  12. 12.
    Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)Google Scholar
  14. 14.
    Castelluccia, C., Jarecki, S., Tsudik, G.: Secret handshakes from ca-oblivious encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293–307. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 84–88 (1981)CrossRefGoogle Scholar
  16. 16.
    Chaum, D.: Blind signatures for untraceable payments. In: Rivest, R.L., Sherman, A., Chaum, D. (eds.) Advances in Cryptology 1982, pp. 199–203 (1999)Google Scholar
  17. 17.
    Chaum, D., Heyst, E.V.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  18. 18.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  19. 19.
    Douceur, J.: The sybil attack. In: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2001), pp. 251–260. Springer, Heidelberg (2001)Google Scholar
  20. 20.
    Fischer, M., Lynch, N., Patterson, M.: Impossibility of distributed consensus with one faulty process. Journal of the ACM 32(2), 374–382 (1985)zbMATHCrossRefGoogle Scholar
  21. 21.
    Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  22. 22.
    Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571–589. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  23. 23.
    Kiayias, A., Yung, M.: Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076 (2004), http://eprint.iacr.org/
  24. 24.
    Krawczyk, H.: Sigma: The ’sign-and-mac’ approach to authenticated diffie-hellman and its use in the ike-protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  25. 25.
    Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. In: Proceedings of 22nd ACM Symposium on Principles of Distributed Computing (PODC), pp. 182–189. ACM Press, New York (2003)Google Scholar
  26. 26.
    Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  27. 27.
    Naor, M.: Deniable ring authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481–498. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  28. 28.
    Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  29. 29.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Proceedings of the Symposium on Cryptography and Information Security (SCIS) (2002)Google Scholar
  30. 30.
    Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems 11(8), 769–780 (2000)CrossRefGoogle Scholar
  31. 31.
    Sun, Y., Liu, K.: Securing dynamic membership information in multicast communications. In: IEEE Infocom 2004 (2004)Google Scholar
  32. 32.
    Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. Full version of the present paper (available from the authors)Google Scholar
  33. 33.
    Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. Internet Draft (September 1998)Google Scholar
  34. 34.
    Wong, C., Gouda, M., Lam, S.: Secure group communication using key graphs. IEEE/ACM Transactions on Networking (Preliminary version in SIGCOMM 1998) 8 (2000)Google Scholar
  35. 35.
    Xu, S.: On the security of group communication schemes based on symmetric key cryptosystems. In: Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005) (2005)Google Scholar
  36. 36.
    Xu, S., Yung, M.: k-anonymous secret handshakes with reusable credentials. In: Proceedings of the 11th ACM conference on Computer and communications security (CCS 2004), pp. 158–167. ACM Press, New York (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Gene Tsudik
    • 1
  • Shouhuai Xu
    • 2
  1. 1.Department of Computer ScienceUniversity of CaliforniaIrvine
  2. 2.Department of Computer ScienceUniversity of TexasSan Antonio

Personalised recommendations