Broadcast or multicast is one of the most fundamental concepts in data communication and distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot lea
Security Intelligence for Broadcast: Algorithmic Complexity
β Scribed by Sumit Chakraborty
- Publisher
- Business Analytics Research Lab India
- Year
- 2012
- Tongue
- English
- Leaves
- 16
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Abstract: Broadcast or multicast is one of the most fundamental concepts in data communication distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot learn the secret. This work presents an adaptively secure broadcast algorithm (ASBA) based on threats analytics and case based reasoning. It defines the security intelligence of an adaptively secure broadcast comprehensively with a novel concept. It recommends a set of intelligent model checking moves for the verification of security intelligence of broadcasting mechanism. The algorithm is analyzed from the perspectives of security intelligence, communication complexity, computational intelligence and mechanism. The computational intelligence is associated with the complexity of broadcast scheduling, verification of security intelligence of broadcasting system, key management strategies and payment function computation. The cost of communication depends on number of agents and subgroups in the broadcasting group and complexity of data. The algorithm is applicable to both static and dynamic networks.
Keywords: Broadcast, Security intelligence, Model checking, Algorithms, Computational intelligence, Communication complexity
Acknowledgment: The reference of this technical report is TC/SIBMCA/V1.0/15082012. The initial version of the present work was incorporated in the thesis of Sumit Chakraborty, βA study of several privacy preserving multi-party negotiation problems with applications to supply chain managementβ as partial fulfillment of Fellow Programme, Indian Institute of Management Calcutta under the guidance of Prof. Asim Kumar Pal, Management Information Systems in 2007 and a paper was presented at HICSSβ2008, Hawaii, USA as βPrivacy preserving 1-n-p negotiation protocolβ. The application domain of these works was combinatorial reverse auction for e-market. The present work is focused on the development of an algorithm for adaptively secure broadcast on the basis of data communication, algorithmic game theory, information security and privacy.
β¦ Table of Contents
The work is organized as follows. Section 1 starts with introduction, the definition of the problem of adaptively secure broadcast, research methodology and states contributions. It reviews existing literature and analyzes the gaps. Section 2 presents adaptively secure broadcast algorithm (ASBA). Section 3 analyzes the algorithm from the perspectives of security intelligence, computational and communication complexity and efficiency of mechanism. Section 4 concludes the paper.
π SIMILAR VOLUMES
<div>This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world,
<div>This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world,
Abstract: This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security
Abstract The basic objective of SIVA is to verify the security and privacy of location based information and communication services based on collective intelligence. The security intelligence of a location based services should be analyzed through a multi-dimensional view : (P1) topology in terms o