Authorization-based Group-oriented Secure Broadcasting System

نویسندگان

  • Tzong-Chen Wu
  • Yuh-Shihng Chang
چکیده

This paper presents an authorization-based group-oriented secure broadcasting system based on the ID-based system proposed by Tsujii and Itoh. In the proposed system, any broadcasting secret in ciphertext form is addressed to “group” instead of “individual”. First of all, the broadcaster defines the message authorization strategy among the individuals in the destination group by considering the characteristics or restrictions of the secret, such as timeliness, integrity, or importance etc. Afterwards, the broadcaster broadcasts the secret in ciphertext form to the destination group such that the individuals in the destination group only can recover the secret by means of authentication, following a predefined message authorization strategy. In general, the broadcaster can define the message authorization strategy for a secure broadcast as one of the following: (1) restricted 1-out-of-n, so that only the specified individual in the destination group can recover it; (2) unrestricted 1-out-of-n, so that any individual in the destination group can recover it; (3) n-out-of-n, so that all individuals in the destination group should collaborate together to recover it; (4) restricted t-out-of-n, so that only the specified t individuals in the destination group should collaborate together to recover it; and (5) unrestricted t-out-of-n, so that any t individuals in the destination group can collaborate together to recover it. The security of the proposed system is based on the difficulty of computing discrete logarithms over GF(p). Also, some possible conspiracy attacks on the proposed system are analyzed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems

In this paper a mechanism for access control at the instance level of a class in object-oriented databases is suggested. The approach is based on the use of pseudo-random functions and sibling intractable functions, rather than on the traditional access control list associated with each object. Each object-instance in the object-oriented model is associated with secure access keys that insure s...

متن کامل

Privilege Delegation and Agent-Oriented Access Control in Naplet

Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where the agent code comes from, regardless of the subject of code execution. This paper presents an agent-oriented access control strategy, by taking advantage of the latest Java subject-based security features. It allows ...

متن کامل

Adaptively Secure Broadcast: Threat Analytics & Security Intelligence

This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 15  شماره 

صفحات  -

تاریخ انتشار 1999