Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Scalable Approach for Subscription-Based Information Commerce
WECWIS '00 Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000)
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
Hi-index | 0.00 |
Consider an electronic commerce (e-commerce) environment where the consumers subscribe to data objects; a server distributes these objects electronically which are then retrieved by the consumer. We propose a protocol showing how the distribution of data objects can be done in a secure and efficient manner. In our protocol, (1) consumers who have subscribed for an object can get access to the object only during the period that their subscription is valid, (2) consumers who have not subscribed to an object do not get access to the object, (3) increasing the number of consumers subscribing to an object does not deteriorate the quality of service, (4) multiple key distributions to each consumer is avoided, (5) key management is simple - each consumer just remembers one key, (6) bandwidth requirements are low, and (7) large processing overhead required for decryption is not incurred by the consumer. The protocol is based on the theory of compatible keys which we illustrate in this paper.