Skip to main content
Log in

Anonymity in shared symmetric key primitives

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new scheme is presented to share symmetric key operations amongst a set of participants according to a (t, n)-threshold access structure. We quantify the amount of information the output of the shared operation provides about the group of participants which collaborated to produce it.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • An J.H., Dodis Y., Rabin T.: On the security of joint signature and encryption. In: Proceedings of EUROCRYPT’02, LNCS 2332, pp. 83–107 (2002).

  • Bassalygo L.A., Burmester M., Dyachkov A., Kabatianski G.: Hash codes. In: Proceedings of the 1997 IEEE International Symposium on Information Theory, pp. 174 (1997).

  • Blackburn S.R., Wild P.R.: Optimal linear perfect hash families. J. Combinat. Theory Ser. A 83, 233–250 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  • Brickell E.F., Di Crescenzo G., Frankel Y.: Sharing block ciphers. In: Information Security and Privacy, LNCS 1841, pp. 457–470 (2000).

  • Even S., Goldreich O.: On the power of cascade ciphers. ACM Trans. Comput. Syst. 3, 108–116 (1985)

    Article  Google Scholar 

  • Katz J., Lindell A.Y.: Aggregate message authentication codes. In: Proceedings of CT-RSA ’08, LNCS 4964, pp. 155–169 (2008).

  • Liu L., Shen H.: Explicit constructions of separating hash families from algebraic curves over finite fields. Desig. Codes Cryptogr. 41, 221–233 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  • Long S., Pieprzyk J., Wang H., Wong D.S.: Generalised cumulative arrays in secret sharing. Desig. Codes Cryptogr. 40, 191–209 (2006)

    Article  MathSciNet  Google Scholar 

  • Martin K.M., Ng S.-L.: The combinatorics of generalised cumulative arrays. J. Math. Cryptol. 1, 13–32 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  • Martin K.M., Pieprzyk J., Safavi-Naini R., Wang H., Wild P.R.: Threshold MACs. In: Proceedings of ICISC 2002, LNCS 2587, pp. 237–252 (2003).

  • Martin K.M., Safavi-Naini R., Wang H., Wild P.R.: Distributing the encryption and decryption of a block cipher. Desig. Codes Cryptogr. 36, 263–287 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  • Melhorn K.: Data Structures and Algorithms, vol 1. Springer-Verlag, Berlin (1984)

    Google Scholar 

  • Walker R.A., II: PHFtables.com. www.phftables.com. Accessed April (2008).

  • Stinson D.R., Wei R., Zhu L.: New constructions for perfect hash families and related structures using combinatorial designs and codes. J. Combinat. Desig. 8, 189–200 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  • Stinson D.R.: Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem. Math. Comput. 71, 379–391 (2002)

    MATH  MathSciNet  Google Scholar 

  • Stinson D.R., Wei R.: Generalized cover-free families. Discrete Math. 279, 463–477 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  • Wang H., Xing C.: Explicit constructions of perfect hash families from algebraic curves over finite fields. J. Combinat. Theory Ser. A 93, 112–124 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  • Wang H., Pieprzyk J.: Shared generation of pseudo-random function with cumulative maps. In: Proceedings of CT-RSA ’03, LNCS 2612, pp. 281–294 (2003).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gregory M. Zaverucha.

Additional information

Communicated by Vincent Rijmen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zaverucha, G.M., Stinson, D.R. Anonymity in shared symmetric key primitives. Des. Codes Cryptogr. 57, 139–160 (2010). https://doi.org/10.1007/s10623-009-9357-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-009-9357-0

Keywords

Mathematics Subject Classification (2000)

Navigation