Secret handshakes from pairing-based key agreements
- 13 May 2004
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Consider a CIA agent who wants to authenticate herself to a server but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents - not even to other CIA servers. We first show how pairing-based cryptography can be used to implement such secret handshakes. We then propose a formal definition for secure secret handshakes, and prove that our pairing-based schemes are secure under the Bilinear Diffie-Hellman assumption. Our protocols support role-based group membership authentication, traceability, indistinguishability to eavesdroppers, unbounded collusion resistance, and forward repudiability. Our secret-handshake scheme can be implemented as a TLS cipher suite. We report on the performance of our preliminary Java implementation.Keywords
This publication has 14 references indexed in Scilit:
- Dynamic Accumulators and Application to Efficient Revocation of Anonymous CredentialsLecture Notes in Computer Science, 2002
- Efficient Algorithms for Pairing-Based CryptosystemsLecture Notes in Computer Science, 2002
- Self-Blindable Credential Certificates from the Weil PairingLecture Notes in Computer Science, 2001
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Science and Business Media LLC ,2000
- A Practical and Provably Secure Coalition-Resistant Group Signature SchemeLecture Notes in Computer Science, 2000
- Efficient group signature schemes for large groupsLecture Notes in Computer Science, 1997
- Tracing TraitorsLecture Notes in Computer Science, 1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- Multiuser cryptographic techniquesPublished by Association for Computing Machinery (ACM) ,1976