Netinfo Security ›› 2015, Vol. 15 ›› Issue (11): 40-46.doi: 10.3969/j.issn.1671-1122.2015.11.007

Previous Articles     Next Articles

A New Secret Handshakes Scheme Based on Chaotic Maps

WANG Wen-bo1, CHENG Qing-feng1,2, LU Si-qi1, ZHAO Jin-hua3   

  1. 1. Department of Language and Engineering, Luoyang University of Foreign Languages, Luoyang Henan 471003, China
    2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    3. Science and Technology on Information Assurance Laboratory, Beijing 100072, China.
  • Received:2015-08-15 Online:2015-11-25 Published:2015-11-20

Abstract:

The primitive secret handshake refers to a privacy-preserving authentication protocol which negotiate the session key without the leak of identity. The authentication can be passed if and only if the two participants are from the same group, after which the shared session key would be established for further communication. However those who do not belong to the group will not get any information about the group. Pal used the ZSS signature to propose a secret handshake scheme with dynamic matching, which has some drawbacks in user revocation and user tracking. This paper first modifies the ZSS signature into the chaotic map based ZSS (ZSS-CM), which is later used to construct a new secret handshake based on chaotic map (SH-CM). The SH-CM protocol costs less computing resources than the protocol proposed by Pal, meanwhile maintaining the basic security properties of secret handshakes, supporting user revocation and user tracking as well, which achieves better security.

Key words: secret handshake, chaotic map, user tracking, user revocation, computation cost

CLC Number: