Using Compatible Keys for Secure Multicasting in E-Commerce
نویسندگان
چکیده
Consider an electronic commerce (e-commerce) environment where the consumers subscribe to data objects; a server distributes these objects electronically which are then retrieved by the consumer. We propose a protocol showing how the distribution of data objects can be done in a secure and efficient manner. In our protocol, (1) consumers who have subscribed for an object can get access to the object only during the period that their subscription is valid, (2) consumers who have not subscribed to an object do not get access to the object, (3) increasing the number of consumers subscribing to an object does not deteriorate the quality of service, (4) multiple key distributions to each consumer is avoided, (5) key management is simple – each consumer just remembers one key, (6) bandwidth requirements are low, and (7) large processing overhead required for decryption is not incurred by the consumer. The protocol is based on the theory of compatible keys which we illustrate in this paper.
منابع مشابه
Key Management Techniques for Dynamic Secure Multicasting: A Distributed Computing Approach
Most of the Internet applications today require multicasting. For example, software updates, multimedia content distribution, interacting gaming and stock data distribution require multicast services. All of these applications require privacy and authenticity of the participants. Most of the multicasting groups are dynamic and some of them are large in number. Only those users who belong to the...
متن کاملA Secure Group Communication and Rekeying using Rabin’s Squaring Trapdoor Function in Multicasting
In today‟s world of internet, secure communication among group of members has become vital, where multicasting plays an important role. In secure multicasting, security and scalability are the two important checks. Sometimes there is tradeoff between security and scalability. In order to transmit the data in a secure and scalable way, a suitable key management protocol should be implemented whi...
متن کاملSecure Coprocessors in Electronic Commerce Applications
Many researchers believe electronic wallets (secure storage devices that maintain account balances) are the solution to electronic commerce challenges. This paper argues for a more powerful model — a secure coprocessor — that can run a small operating system, run application programs, and also keep secure storage for cryptographic keys and balance information. We have built a system called Dyad...
متن کاملTowards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property
The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is th...
متن کاملA Dual Encryption Protocol for Scalable Secure Multicasting
In this paper we propose a dual encryption protocol f o r scalable secure multicasting. Multicasting is a scalable solution f o r group communication. It howevel; poses several unique security problems. We use hierarchical subgrouping to achieve scalability. Third party hosts or members of the multicast group are designated as subgroup managers. They are responsible for secret key distribution ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002