Secret handshakes from CA-oblivious encryption

100Citations
Citations of this article
54Readers
Mendeley users who have this article in their library.

Abstract

Secret handshakes were recently introduced [BDS+003] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of this group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, a secret handshake protocol can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders. The work of [BDS+03] constructed secret handshakes secure under the Bilinear Diffie-Hellman (BDH) assumption in the Random Oracle Model (ROM). We show how to build secret handshake protocols secure under a more standard cryptographic assumption of Computational Diffie Hellman (CDH), using a novel tool of CA-oblivous public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the [BDS+03] scheme, but it is about twice cheaper computationally. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Castelluccia, C., Jarecki, S., & Tsudik, G. (2004). Secret handshakes from CA-oblivious encryption. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3329, 293–307. https://doi.org/10.1007/978-3-540-30539-2_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free