Advertisement

Optionally Identifiable Private Handshakes

  • Yanjiang Yang
  • Jian Weng
  • Jianying Zhou
  • Ying Qiu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6151)

Abstract

It is now a trend that Internet users are increasingly concerned about individual privacy, and as a result numerous privacy- preserving authentication techniques have been proposed. In this paper, we propose the concept of private handshakes with optional identifiability, which allows the two users in a handshake deciding real time to either proceed their interaction as secret handshake or as private handshake. Such optionally identifiable private handshakes are a more flexible privacy-preserving authentication primitive than secret handshakes and private handshakes. We formulate a formal definition for optionally identifiable private handshakes, as well as a set of security definitions, and propose a concrete scheme. We implement a proof-of-concept prototype of the proposed scheme, on top of the widely used TLS protocol.

Keywords

Random Oracle Transport Layer Security Probabilistic Polynomial Time Handshake Protocol Group Administrator 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshakes with Dynamic and Fuzzy Matching. In: Proc. Network and Distributed System Security Symposium, NDSS 2007 (2007)Google Scholar
  2. 2.
    Ateniese, G., Medeiros, B.: Efficient Group Signatures without Trapdoors. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 246–268. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.: Secret Handshakes from Pairing-Based Key Agreements. In: Proc. IEEE Security & Privacy, pp. 180–196 (2003)Google Scholar
  4. 4.
    Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Paring. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Baldwin, R., Gramlich, W.: Cryptographic Protocol for Trustable Matching Making. In: Proc. IEEE Security & Privacy, pp. 92–100 (1985)Google Scholar
  6. 6.
    Barreto, M., Kim, H., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 354. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Bellar, M., Rogaway, P.: Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. In: Proc. ACM Computers and Communications Security, CCS 2003, pp. 62–73 (2003)Google Scholar
  8. 8.
    Castelluccia, C., Jarecki, S., Tsudik, G.: Seccret Handshakes from Oblivious Encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293–307. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Camenisch, J., Lysyanskaya, A.: An Efficient Sysem for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Coron, J.S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Jarechi, S., Kim, J., Tsudik, G.: Authenticated Group Key Agreement Protocols with the Privacy Property of Affilation-hidding. In: Proc. CT-RSA Conference (2007)Google Scholar
  12. 12.
    Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270–287. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Hoepman, J.H.: Private Handshakes. In: Proc. 4th Eur. Symp. on Security and Privacy in Ad hoc and Sensor Networks, pp. 31–42 (2007)Google Scholar
  14. 14.
    Scott, M.: Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL), http://indigo.ie/~mscott/
  15. 15.
    The Transport Layer Security (TLS) Protocol Version 1.2. IETF Network Working Group, http://tools.ietf.org/html/rfc5246
  16. 16.
    Tsudik, G., Xu, S.: Flexible Framework for Secret Handshakes. Cryptology ePrint Archive, Report 2005/034Google Scholar
  17. 17.
    Vergnaud, D.: RSA-based Secret Handshakes. In: Proc. International Workshop on Coding and Cryptogaphy (2005)Google Scholar
  18. 18.
    Xu, S., Yung, M.: K-Anonymous Secret Handshakes with Reusable Credentials. In: Proc. ACM Computers and Communications Security, CCS 2004, pp. 158–167 (2004)Google Scholar
  19. 19.
    Yang, Y.J., Weng, J., Zhou, J.Y., Qiu, Y.: Optionally Identifiable Private Handshakes. In: Proc. ICICS 2009 (2009), http://icsd.i2r.a-star.edu.sg/sta/yanjiang/papers/icics09.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Yanjiang Yang
    • 1
  • Jian Weng
    • 2
    • 3
  • Jianying Zhou
    • 1
  • Ying Qiu
    • 1
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.Dept. of Computer ScienceJinan UniversityChina
  3. 3.School of Information SystemsSingapore Management UniversitySingapore

Personalised recommendations