Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Secret Handshake protocol allows members of the same group to authenticate each other secretly, that is, two members who belong to the same group can learn counterpart is in the same group, while non-member of the group cannot determine whether the counterpart is a member of the group or not. Yamashita and Tanaka proposed Secret Handshake Scheme with Multiple Groups (SHSMG). They extended a single group setting to a multiple groups setting where two members output “accept” iff both member’s affiliations of the multiple groups are identical. In this paper, we first show the flaw of their SHSMG, and we construct a new secure SHSMG. Second, we introduce a new concept of Secret Handshake scheme, “monotone condition Secret Handshake with Multiple Groups (mc-SHSMG)”, in order to extend the condition of “accept”. In our new setting of handshake protocol, members can authenticate each other in monotone condition (not only both member’s affiliations are identical but also the affiliations are not identical). The communication costs and computational costs of our proposed mc-SHSMG are fewer than the trivial construction of mc-SHSMG.
KeywordsSecret Handshake with Multiple Groups Privacy preserving authentication Anonymity Monotone Condition
Unable to display preview. Download preview PDF.
- 1.Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshake with Dynamic and Fuzzy Matching. In: Network and Distributed System Security Symposium (2007)Google Scholar
- 2.Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.-C.: Secret Handshakes from Pairing-Based Key Agreements. In: IEEE Symposium on Security and Privacy, pp. 180–196 (2003)Google Scholar
- 5.Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication). Cryptology ePrint Archive (2005)Google Scholar
- 6.Tsudik, G., Xu, S.: Brief announcement: A flexible framework for secret handshakes. In: ACM Symposium on Principles of Distributed Computing (2005)Google Scholar