Security Intelligence for Broadcast: Algorithmic Complexity

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Abstract: Broadcast or multicast is one of the most fundamental concepts in data communication distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot learn the secret. This work presents an adaptively secure broadcast algorithm (ASBA) based on threats analytics and case based reasoning. It defines the security intelligence of an adaptively secure broadcast comprehensively with a novel concept. It recommends a set of intelligent model checking moves for the verification of security intelligence of broadcasting mechanism. The algorithm is analyzed from the perspectives of security intelligence, communication complexity, computational intelligence and mechanism. The computational intelligence is associated with the complexity of broadcast scheduling, verification of security intelligence of broadcasting system, key management strategies and payment function computation. The cost of communication depends on number of agents and subgroups in the broadcasting group and complexity of data. The algorithm is applicable to both static and dynamic networks. Keywords: Broadcast, Security intelligence, Model checking, Algorithms, Computational intelligence, Communication complexity Acknowledgment: The reference of this technical report is TC/SIBMCA/V1.0/15082012. The initial version of the present work was incorporated in the thesis of Sumit Chakraborty, “A study of several privacy preserving multi-party negotiation problems with applications to supply chain management” as partial fulfillment of Fellow Programme, Indian Institute of Management Calcutta under the guidance of Prof. Asim Kumar Pal, Management Information Systems in 2007 and a paper was presented at HICSS’2008, Hawaii, USA as ‘Privacy preserving 1-n-p negotiation protocol’. The application domain of these works was combinatorial reverse auction for e-market. The present work is focused on the development of an algorithm for adaptively secure broadcast on the basis of data communication, algorithmic game theory, information security and privacy.

Author(s): Sumit Chakraborty
Publisher: Business Analytics Research Lab India
Year: 2012

Language: English
Pages: 16
City: Chennai

The work is organized as follows. Section 1 starts with introduction, the definition of the problem of adaptively secure broadcast, research methodology and states contributions. It reviews existing literature and analyzes the gaps. Section 2 presents adaptively secure broadcast algorithm (ASBA). Section 3 analyzes the algorithm from the perspectives of security intelligence, computational and communication complexity and efficiency of mechanism. Section 4 concludes the paper.