By Topic

Attacks on a secure group communication scheme with hierarchical access control

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
W. Geiselmann ; Fak. fur Inf., Karlsruhe Univ., Germany ; R. Steinwandt

This paper describes the attacks on a secure group communication with hierarchical access control, which arises in the communication group involving users with different privilege levels. The basic idea is to enable each subgroup to read the messages of those subgroups that are located at a lower level in the hierarchy. For such a setting, the Chinese remainder theorem based hierarchical access control scheme CRTHACS is proposed, which also aims at hiding the underlying hierarchy. Here we describe practical attacks, which allow for revealing at least parts of the hierarchy.

Published in:

Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on

Date of Conference:

27 June-2 July 2004