Secret handshakes: cell–cell interactions and cellular mimics
نویسندگان
چکیده
منابع مشابه
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries....
متن کاملSecret Handshakes with Revocation Support
Secret Handshake is becoming an ever more popular research subject in the field of privacypreserving authentication protocols. Revocation of credentials in Secret Handshakes is a difficult challenge, as it mixes the conflicting requirements of tracing revoked users and of the untraceability and unlinkability of legitimate protocol players. The schemes proposed in the literature are either limit...
متن کاملSecret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have become critical primitives in building secure distributed systems. Secret handshakes provide such a service by allowing two members of the same group to secretly and privately authenticate to each other and agree on a sh...
متن کاملFederated Secret Handshakes with Support for Revocation
Secret Handshakes are well-established cryptographic primitives that help two mistrusting users to establish initial trust by proving and verifying possession of given properties, such as group membership. All the Secret Handshake schemes to date assume the existence of a single, centralized Certification Authority (CA). We challenge this assumption and create the first Secret Handshake scheme ...
متن کاملSecret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents – not even to other CIA servers. In this paper we first show how pairing-based cryptography can be used to implement such secret handsh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Current Opinion in Cell Biology
سال: 2018
ISSN: 0955-0674
DOI: 10.1016/j.ceb.2018.01.001