Secret handshakes: Full dynamicity, deniability and lattice-based design

被引:4
|
作者
An, Zhiyuan [1 ,2 ]
Pan, Jing [3 ]
Wen, Yamin [4 ]
Zhang, Fangguo [1 ,2 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[2] Guangdong Prov Key Lab Informat Secur Technol, Guangzhou 510006, Peoples R China
[3] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Peoples R China
关键词
Secret handshake; Lattice cryptography; Full dynamicity; Zero; -knowledge; Deniability; SCHEME; AUTHENTICATION; PROOFS;
D O I
10.1016/j.tcs.2022.10.035
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secret handshake (SH), as an essential privacy-preserving primitive, entitles members of the same group to anonymously authenticate each other. Among all the existing designs, only the ones separately proposed by Zhang et al. over coding theory and An et al. over lattice are post-quantum secure. However, both schemes fall short of being practical due to their huge overhead (>> 100 MB), and the code-based one is even insecure under impersonator attacks. Besides, all the known SH constructions are powerless to handle the problem of dynamically managing users. To fill the gap, in this work we first formalize the model of fully dynamic secret handshakes (FDSH), where members have the freedom of joining or leaving a group. Then, to achieve anonymous mutual authentication with ease, we introduce a newly-defined cryptographic primitive called anonymous message exchange (AME), where legal participants can exchange their messages anonymously. Further, two generic approaches of AME from non-interactive zero-knowledge arguments of knowledge (NIZKAoK) are provided, along with heuristic applications. Finally, by combining a well -designed AME and other suitable techniques, we present the first lattice-based FDSH in the random oracle model offering another attractive property: full deniability, which enables users to plausibly deny their participating in interactions. Our scheme sharply reduces the communication cost (< 10 MB) and surpasses the existing post-quantum systems in terms of security, efficiency, and functionality.(c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:14 / 35
页数:22
相关论文
共 50 条
  • [21] Lattice-based cryptography
    Regev, Oded
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [22] Lattice-based sums
    El-Zekey, Moataz
    Medina, Jesus
    Mesiar, Radko
    INFORMATION SCIENCES, 2013, 223 : 270 - 284
  • [23] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467
  • [24] Lattice-based signcryption
    Li, Fagen
    Bin Muhaya, Fahad T.
    Khan, Muhammad Khurram
    Takagi, Tsuyoshi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (14): : 2112 - 2122
  • [25] Lattice-based threshold-changeability for standard Shamir secret-sharing schemes
    Steinfeld, R
    Wang, HX
    Pieprzyk, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 170 - 186
  • [26] Lattice codes for lattice-based PKE
    Lyu, Shanxiang
    Liu, Ling
    Ling, Cong
    Lai, Junzuo
    Chen, Hao
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (04) : 917 - 939
  • [27] Secret handshakes from pairing-based key agreements
    Balfanz, D
    Durfee, G
    Shankar, N
    Smetters, D
    Staddon, J
    Wong, HC
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 180 - 196
  • [28] Lattice-based Cryptanalysis - how to estimate the security parameter of lattice-based cryptosystem
    Kuo, Po-Chun
    Cheng, Chen-Mou
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2014,
  • [29] New constructions of the lattice-based visual secret sharing scheme using mixture of colors
    Ishihara, T
    Koga, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 158 - 166
  • [30] Lattice-based threshold-changeability for standard CRT secret-sharing schemes
    Steinfeld, Ron
    Pieprzyk, Josef
    Wang, Huaxiong
    FINITE FIELDS AND THEIR APPLICATIONS, 2006, 12 (04) : 653 - 680