Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups
The technique of group secret handshake (GSH) has been used to help the members affiliated with the same group in achieving private authentication. After executing GSH protocols, the participants affiliated with the group can compute a shared secret key, or generate a public encryption key while the...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-01-01
|
Series: | Mathematics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7390/11/3/532 |
_version_ | 1797623934388011008 |
---|---|
author | Dong Han Zhen Li Mengyu Wang Chang Xu Kashif Sharif |
author_facet | Dong Han Zhen Li Mengyu Wang Chang Xu Kashif Sharif |
author_sort | Dong Han |
collection | DOAJ |
description | The technique of group secret handshake (GSH) has been used to help the members affiliated with the same group in achieving private authentication. After executing GSH protocols, the participants affiliated with the group can compute a shared secret key, or generate a public encryption key while the true participants can self-compute their decryption keys. This paper presents a concrete GSH protocol with Multiple Groups. Only a legitimate member can prove that it belongs to a set of legitimate affiliations, but which affiliation it belongs to will not be leaked. The Group Authority can reveal the real identities of the fellows in the proposed scheme after analyzing the flow of communication. The proposed scheme can provide affiliation-hiding and detectability. In addition, it achieves Perfect Forward Secrecy. |
first_indexed | 2024-03-11T09:35:48Z |
format | Article |
id | doaj.art-b1c0a35fde5645079941b60e19590547 |
institution | Directory Open Access Journal |
issn | 2227-7390 |
language | English |
last_indexed | 2024-03-11T09:35:48Z |
publishDate | 2023-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Mathematics |
spelling | doaj.art-b1c0a35fde5645079941b60e195905472023-11-16T17:20:57ZengMDPI AGMathematics2227-73902023-01-0111353210.3390/math11030532Privacy Preservation Authentication: Group Secret Handshake with Multiple GroupsDong Han0Zhen Li1Mengyu Wang2Chang Xu3Kashif Sharif4School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaSchool of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaSchool of Cyberspace Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaSchool of Cyberspace Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaSchool of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaThe technique of group secret handshake (GSH) has been used to help the members affiliated with the same group in achieving private authentication. After executing GSH protocols, the participants affiliated with the group can compute a shared secret key, or generate a public encryption key while the true participants can self-compute their decryption keys. This paper presents a concrete GSH protocol with Multiple Groups. Only a legitimate member can prove that it belongs to a set of legitimate affiliations, but which affiliation it belongs to will not be leaked. The Group Authority can reveal the real identities of the fellows in the proposed scheme after analyzing the flow of communication. The proposed scheme can provide affiliation-hiding and detectability. In addition, it achieves Perfect Forward Secrecy.https://www.mdpi.com/2227-7390/11/3/532ring group signatureauthenticationgroup key exchangeprivacy |
spellingShingle | Dong Han Zhen Li Mengyu Wang Chang Xu Kashif Sharif Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups Mathematics ring group signature authentication group key exchange privacy |
title | Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups |
title_full | Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups |
title_fullStr | Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups |
title_full_unstemmed | Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups |
title_short | Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups |
title_sort | privacy preservation authentication group secret handshake with multiple groups |
topic | ring group signature authentication group key exchange privacy |
url | https://www.mdpi.com/2227-7390/11/3/532 |
work_keys_str_mv | AT donghan privacypreservationauthenticationgroupsecrethandshakewithmultiplegroups AT zhenli privacypreservationauthenticationgroupsecrethandshakewithmultiplegroups AT mengyuwang privacypreservationauthenticationgroupsecrethandshakewithmultiplegroups AT changxu privacypreservationauthenticationgroupsecrethandshakewithmultiplegroups AT kashifsharif privacypreservationauthenticationgroupsecrethandshakewithmultiplegroups |