Abstract—A security pattern describes a particular recurring security problem that arises in specific contexts and presents a well-proven generic solution for it. This paper describes Untraceable Secret Handshakes, cryptographic protocols that allow two users to mutually verify another’s properties without revealing their identity or other sensitive information. The complex security solution is split into smaller parts, which are described in an abstract way. The identified security problems and their solutions are captured as SERENITY security patterns. The structured description together with motivating scenarios from three different domains makes the security solution better understandable for non-security experts and helps to disseminat...
© 2019 The British Computer Society. All rights reserved. In this paper, we introduce a new construc...
Abstract. Secret handshake allows two members in the same group to authenticate each other secretly....
Secret handshake schemes have been proposed to achieve private mutual authentications, which allow t...
Abstract—A security pattern describes a particular recurring security problem that arises in specifi...
A security pattern describes a particular recurring secu-rity problem that arises in specific contex...
International audienceA security pattern describes a particular recurring securityproblem that arise...
In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are...
In this paper, we introduce a new construction for unlinkable secret handshake that allows a group o...
Abstract. A secret handshake mechanism allows two entities, members of a same group, to authenticate...
Balfanz et al. in 2003 introduced secret handshakes as mechanisms designed to prove group membership...
Parties cooperating in hostile networked environments often need to establish an initial trust. Trus...
Parties cooperating in hostile networked environments often need to establish an initial trust. Trus...
The need for communication privacy over public networks is of growing concern in today’s society. As...
International audienceA secret handshake mechanism allows two entities, members of a same group, to ...
© 2019 The British Computer Society. All rights reserved. In this paper, we introduce a new construc...
© 2019 The British Computer Society. All rights reserved. In this paper, we introduce a new construc...
Abstract. Secret handshake allows two members in the same group to authenticate each other secretly....
Secret handshake schemes have been proposed to achieve private mutual authentications, which allow t...
Abstract—A security pattern describes a particular recurring security problem that arises in specifi...
A security pattern describes a particular recurring secu-rity problem that arises in specific contex...
International audienceA security pattern describes a particular recurring securityproblem that arise...
In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are...
In this paper, we introduce a new construction for unlinkable secret handshake that allows a group o...
Abstract. A secret handshake mechanism allows two entities, members of a same group, to authenticate...
Balfanz et al. in 2003 introduced secret handshakes as mechanisms designed to prove group membership...
Parties cooperating in hostile networked environments often need to establish an initial trust. Trus...
Parties cooperating in hostile networked environments often need to establish an initial trust. Trus...
The need for communication privacy over public networks is of growing concern in today’s society. As...
International audienceA secret handshake mechanism allows two entities, members of a same group, to ...
© 2019 The British Computer Society. All rights reserved. In this paper, we introduce a new construc...
© 2019 The British Computer Society. All rights reserved. In this paper, we introduce a new construc...
Abstract. Secret handshake allows two members in the same group to authenticate each other secretly....
Secret handshake schemes have been proposed to achieve private mutual authentications, which allow t...