Authorization-based Group-oriented Secure Broadcasting System

This paper presents an authorization-based group-oriented secure broadcasting sys-tem based on the ID-based system proposed by Tsujii and Itoh. In the proposed system, anybroadcasting secret in ciphertext form is addressed to figroupfl instead of fiindividualfl. Firstof all, the broadcaster defines the message authorization strategy among the individuals inthe destination group by considering the characteristics or restrictions of the secret, such astimeliness, integrity, or importance etc. Afterwards, the broadcaster broadcasts the secret inciphertext form to the destination group such that the individuals in the destination grouponly can recover the secret by means of authentication, following a predefined messageauthorization strategy. In general, the broadcaster can define the message authorizationstrategy for a secure broadcast as one of the following: (1) restricted 1-out-of- n, so that onlythe specified individual in the destination group can recover it; (2) unrestricted 1-out-of-n,so that any individual in the destination group can recover it; (3) n-out-of-n, so that allindividuals in the destination group should collaborate together to recover it; (4) restrictedt-out-of-n, so that only the specified t individuals in the destination group should collabo-rate together to recover it; and (5) unrestricted t-out-of-n, so that any t individuals in thedestination group can collaborate together to recover it. The security of the proposed sys-tem is based on the difficulty of computing discrete logarithms over GF(p). Also, somepossible conspiracy attacks on the proposed system are analyzed.Keywords: secure broadcasting, authorization-based, group-oriented, ID-based system,authentication, discrete logarithms

[1]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[4]  Tzonelih Hwang Protocols for Group Oriented Secret Sharing , 1992, Inf. Process. Lett..

[5]  S. Kent Security Requirements and Protocols for a Broadcast Scenario , 1981, IEEE Trans. Commun..

[6]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[7]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[8]  Tai-Chi Wu,et al.  Cryptosystem for selectively broadcasting separate secrets , 1993 .

[9]  Chin-Chen Chang,et al.  A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers , 1993, IEEE J. Sel. Areas Commun..

[10]  Gustavus J. Simmons,et al.  How to (Selectively) Broadcast A Secret , 1985, 1985 IEEE Symposium on Security and Privacy.

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[13]  Jeffrey M. Jaffe,et al.  Point-To-Multipoint Communication Over Broadcast Links , 1984, IEEE Trans. Commun..

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[16]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Charles Cresson Wood,et al.  Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.

[19]  Yair Frankel,et al.  A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.

[20]  Yvo Desmedt,et al.  Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.

[21]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[22]  Cc Chang,et al.  BROADCASTING CRYPTOSYSTEM IN COMPUTER-NETWORKS USING INTERPOLATING POLYNOMIALS , 1991 .