Archive - Central European Conference on Information and Intelligent Systems, CECIIS - 2009

Font Size: 
Cryptographic routing protocol for secure distribution and multiparty negotiatiated access control
Tonimir Kišasondi, Željko Hutinski

Last modified: 2009-08-24

Abstract


<!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:AR-SA;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->Standard key distribution protocols cannot distribute keys or content with respect to multi-party defined access rules or multi-party negotiated access or resource granting. Other possible requirements are full user anonymity or partial votes that grant access to a resource with respect to the content or key requesting side. In such systems the access rules can't be centralized and can change per host basis. We designed one such protocol that allows multi-party negotiated access control and in this work we give the suggested protocol design implementation and analysis.

Full Text: PDF