1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young...
-
date post
21-Dec-2015 -
Category
Documents
-
view
214 -
download
0
Transcript of 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young...
![Page 1: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/1.jpg)
1
A secure broadcasting cryptosystem and its application to grid com
putingEun-Jun Yoon, Kee-Young Yoo
Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012
Received date: 25 February 2010Revised date: 13 September 2010
Accepted date: 24 September 2010
2010/10/14 廖俊威
![Page 2: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/2.jpg)
2
Broadcasting Cryptosystem
• The main purpose of a broadcasting cryptosystem is to – establish a secure communication channel from a sen
der to a group of legal receivers.
• In the broadcasting cryptosystem, – a sender can broadcast an encrypted message to a gr
oup of legal receivers.– Then, only legal receivers can decrypt the message, – and illegal receivers cannot acquire any important info
rmation from the broadcast message.
![Page 3: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/3.jpg)
3
![Page 4: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/4.jpg)
4
• The disadvantages of previous researches:– Need many broadcasting messages for a group of legal receivers.– Hard to add new users into the previous constructed groups
• Liaw [21] proposed a secure broadcasting cryptosystem with fewer broadcasting messages based on the RSA cryptosystem and symmetric cryptosystem, which allows easy addition of new users into the active groups.
• Sun [22] showed that Liaw’s broadcasting cryptosystem becomes actually infeasible since a prohibitively large amount of information must be kept by each user, and be sent as the rekey message for each broadcast.
• Tseng and Jan [23] also pointed out the several security weaknesses in the Liaw’s cryptosystem in 2001.
• To remedy this attack, Tseng and Jan also proposed a modification broadcasting cryptosystem.
• in 2006, Masque and Peinado [24] pointed out that Tseng and Jan’s broadcasting cryptosystem [23] actually does not work due to incorrect arithmetic and then presented a redefined Liaw’s broadcasting cryptosystem,
• in 2008, Zhu-Wu [29] showed that the redefined Liaw’s scheme [24] is still insecure in that an unauthorized user is able to obtain the shared secret, which is only intended for certain privileged users.
• Zhu-Wu did not provide an improvement.• This paper found that the redefined Liaw’s broadcasting cryptosystem has a
nother security problems, and proposed a new secure authenticated broadcasting cryptosystem.
![Page 5: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/5.jpg)
5
The redefined Liaw’s broadcasting cryptosystem
System setup phase
![Page 6: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/6.jpg)
6
Broadcasting phasea sender S = U1 wants to broadcast a message M t
o a group of users G = {Ui}ai =2
![Page 7: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/7.jpg)
7
Decryption phase
Zhu-Wu’s cryptanalysis:unauthorized user Uj can get sk
![Page 8: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/8.jpg)
8
Future cryptanalysis
1. Integrity violence of the session key from illegal modification
![Page 9: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/9.jpg)
9
2. Session key modification attack
![Page 10: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/10.jpg)
10
3. Message modification attack
• This message modification attack can be succeed by the attacker because the legitimate receivers do not verify the integrity of the decrypted message.
![Page 11: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/11.jpg)
11
Proposed authenticated broadcasting cryptosystem
• System setup phase
![Page 12: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/12.jpg)
12
Broadcasting phasea sender S = U1 wants to broadcast a message M t
o a group of users G = {Ui}ai =2
![Page 13: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/13.jpg)
13
Decryption phase
![Page 14: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/14.jpg)
14
Application to grid computing environments
![Page 15: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/15.jpg)
15
![Page 16: 1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.](https://reader035.fdocuments.net/reader035/viewer/2022062714/56649d565503460f94a33eb8/html5/thumbnails/16.jpg)
16
Conclusions
• This research presents a new secure broadcasting cryptosystem.
• It is suitable for grid computing environments.
• It provides strong security compared with related cryptosystems.
• It provides secure authentication and secure session key establishment.