Secret handshakes: Full dynamicity, deniability and lattice-based design

被引:4
|
作者
An, Zhiyuan [1 ,2 ]
Pan, Jing [3 ]
Wen, Yamin [4 ]
Zhang, Fangguo [1 ,2 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[2] Guangdong Prov Key Lab Informat Secur Technol, Guangzhou 510006, Peoples R China
[3] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Peoples R China
关键词
Secret handshake; Lattice cryptography; Full dynamicity; Zero; -knowledge; Deniability; SCHEME; AUTHENTICATION; PROOFS;
D O I
10.1016/j.tcs.2022.10.035
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secret handshake (SH), as an essential privacy-preserving primitive, entitles members of the same group to anonymously authenticate each other. Among all the existing designs, only the ones separately proposed by Zhang et al. over coding theory and An et al. over lattice are post-quantum secure. However, both schemes fall short of being practical due to their huge overhead (>> 100 MB), and the code-based one is even insecure under impersonator attacks. Besides, all the known SH constructions are powerless to handle the problem of dynamically managing users. To fill the gap, in this work we first formalize the model of fully dynamic secret handshakes (FDSH), where members have the freedom of joining or leaving a group. Then, to achieve anonymous mutual authentication with ease, we introduce a newly-defined cryptographic primitive called anonymous message exchange (AME), where legal participants can exchange their messages anonymously. Further, two generic approaches of AME from non-interactive zero-knowledge arguments of knowledge (NIZKAoK) are provided, along with heuristic applications. Finally, by combining a well -designed AME and other suitable techniques, we present the first lattice-based FDSH in the random oracle model offering another attractive property: full deniability, which enables users to plausibly deny their participating in interactions. Our scheme sharply reduces the communication cost (< 10 MB) and surpasses the existing post-quantum systems in terms of security, efficiency, and functionality.(c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:14 / 35
页数:22
相关论文
共 50 条
  • [1] Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease
    Ling, San
    Nguyen, Khoa
    Wang, Huaxiong
    Xu, Yanhong
    THEORETICAL COMPUTER SCIENCE, 2019, 783 : 71 - 94
  • [2] Lattice-Based Secret Handshakes with Reusable Credentials
    An, Zhiyuan
    Zhang, Zhuoran
    Wen, Yamin
    Zhang, Fangguo
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 231 - 248
  • [3] Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
    Pan, Jing
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 156 - 186
  • [4] On the Design and Security of a Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Pilaram, Hossein
    Eghlidos, Taraneh
    Aref, Mohammad Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 25 - 38
  • [5] A Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Eghlidos, Taraneh
    Aref, Mohammadreza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
  • [6] Improved lattice-based multistage secret sharing scheme
    Kumar, Ramakant
    Padhye, Sahadeo
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02):
  • [7] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62
  • [8] RSA-based secret handshakes
    Vergnaud, Damien
    CODING AND CRYPTOGRAPHY, 2006, 3969 : 252 - 274
  • [9] A Lattice-Based Single-Share Secret Sharing Scheme
    Ramakant Kumar
    Sahadeo Padhye
    SN Computer Science, 4 (6)
  • [10] On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Xu, Jianqiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4441 - 4442