A Flexible Framework for Secret Handshakes or: How to Achieve Multi-Party Interactive Anonymous Mutual Authentication
نویسندگان
چکیده
In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are becoming very important. Secret handshakes offer anonymous and unobservable authentication and serve as an important tool in the arsenal of privacy-preserving techniques. Relevant prior research focused on 2-party secret handshakes with one-time credentials, whereby two parties establish a secure, anonymous and unobservable communication channel only if they are members of the same group. This paper breaks new ground on two accounts: (1) it shows how to obtain secure and efficient secret handshakes with reusable credentials, and (2) it provides the first treatment of multi-party secret handshakes, whereby m ≥ 2 parties establish a secure, anonymous and unobservable communication channel if they all belong to the same group. An interesting new issue encountered in multi-party secret handshakes is the need to ensure that all parties are indeed distinct. (This is a real challenge since the parties cannot expose their identities.) We tackle this and other challenging issues in constructing GCD – a flexible secret handshake framework. GCD can be viewed as a “compiler” that transforms three main building blocks (a Group signature scheme, a Centralized group key distribution scheme, and a Distributed group key agreement scheme) into a secure multi-party secret handshake scheme. The proposed framework lends itself to multiple practical instantiations, and offers several novel and appealing features such as self-distinction and strong anonymity with reusable credentials. In addition to describing the motivation and step-by-step construction of the framework, this paper provides a security analysis and illustrates several concrete framework instantiations.
منابع مشابه
A Flexible Framework for Secret Handshakes
In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are becoming very important. This motivates research in cryptographic techniques offering built-in privacy. A secret handshake is a protocol whereby participants establish a secure, anonymous and unobservable communication channel only if they are members of the same group. This type of “private” au...
متن کاملK-Anonymous Multi-party Secret Handshakes
Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, authentication methods are also crucial for such interactions. Secret handshake is a relatively recent mechanism that facilitates privacy-preserving mutual authentication between communicating peers. In recent years, researchers ha...
متن کاملCryptanalysis of Efficient Unlinkable Secret Handshakes for Anonymous Communications
Several unlinkable secret handshakes schemes have been proposed in recent years. As performing the successful secret handshakes is essentially equivalent to computing a common key between two interactive members of the same group. Therefore secret handshakes scheme is a key agreement protocol between two members of the same group. So it is necessary for a secret handshakes scheme to fulfill sec...
متن کاملAuthentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to traditional security tools such as authentication and key distribution protocols. A secret handshake protocol allow members of the same group to authenticate each other secretly, meaning that a non-member cannot determi...
متن کاملSecurity Patterns for Untraceable Secret Handshakes with optional Revocation
A security pattern describes a particular recurring security problem that arises in specific contexts and presents a well-proven generic solution for it. This paper describes Untraceable Secret Handshakes, cryptographic protocols that allow two users to mutually verify another’s properties without revealing their identity or other sensitive information. The complex security solution is split in...
متن کامل