skip to main content
10.1145/1011767.1011857acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Brief announcement: secret handshakes from CA-oblivious encryption

Published: 25 July 2004 Publication History

Abstract

Secret handshake protocols were recently introduced by Balfanz, et al. [1] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member cannot tell, by engaging in the handshake protocol, whether his counterparty is a member of the group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, secret handshakes can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders. The secret handshake protocol of [1] relies on a Bilinear Diffie-Hellman assumption on certain elliptic curves. We show how to build secret handshake protocols secure under more standard cryptographic assumptions, like the RSA or the Diffie Hellman (DH) assumption, using a novel tool of CA-oblivious public key encryption, i.e. an encryption scheme where neither the public key nor the ciphertext reveal any information about the Certification Authority which certified the public key.

Reference

[1]
Balfanz, Durfee, Shankar, Smetters, Staddon, Wong, "Secret handshakes from pairing-based key agreements," in IEEE Symposium on Security and Privacy, 2003.

Cited By

View all
  • (2019)Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption2019 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI.2019.8823199(30-34)Online publication date: Jul-2019
  • (2018)Secret Handshakes-Based Fuzzy Clustering for Sharing Personal e-Health Records2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC.2018.00267(1541-1545)Online publication date: Oct-2018
  • (2011)Private discovery of common social contactsProceedings of the 9th international conference on Applied cryptography and network security10.5555/2025968.2025980(147-165)Online publication date: 7-Jun-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PODC '04: Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
July 2004
422 pages
ISBN:1581138024
DOI:10.1145/1011767
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 July 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. authentication
  3. encryption
  4. privacy

Qualifiers

  • Article

Conference

PODC04
PODC04: Principles of Distributed Computing 2004
July 25 - 28, 2004
Newfoundland, St. John's, Canada

Acceptance Rates

Overall Acceptance Rate 740 of 2,477 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption2019 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI.2019.8823199(30-34)Online publication date: Jul-2019
  • (2018)Secret Handshakes-Based Fuzzy Clustering for Sharing Personal e-Health Records2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC.2018.00267(1541-1545)Online publication date: Oct-2018
  • (2011)Private discovery of common social contactsProceedings of the 9th international conference on Applied cryptography and network security10.5555/2025968.2025980(147-165)Online publication date: 7-Jun-2011
  • (2009)Secret HandshakeProceedings of the 5th International Conference on Information Security Practice and Experience10.1007/978-3-642-00843-6_20(219-229)Online publication date: 2-Apr-2009
  • (2008)PPAAProceedings of the 6th international conference on Applied cryptography and network security10.5555/1788857.1788861(55-74)Online publication date: 3-Jun-2008
  • (2007)K-anonymous multi-party secret handshakesProceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security10.5555/1785594.1785608(72-87)Online publication date: 12-Feb-2007
  • (2006)Secret handshake with multiple groupsProceedings of the 7th international conference on Information security applications: PartI10.5555/1764677.1764711(339-348)Online publication date: 28-Aug-2006
  • (2006)Authentication for paranoidsProceedings of the 4th international conference on Applied Cryptography and Network Security10.1007/11767480_22(325-339)Online publication date: 6-Jun-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media