Abstract
A metering scheme is a method by which an audit agency is able to measure the interaction between servers and clients during a certain number of time frames. Naor and Pinkas [9] considered schemes in which any server is able to construct a proof if and only if it has been visited by at least a number, say h, of clients in a given time frame. In this paper we construct metering schemes for more general access structures, which include multilevel and compartmented access structures. Metering schemes realizing these access structures have useful practical applications: for example, they can be used to measure the interaction of a web site with a specific audience which is of special interest. We also prove lower bounds on the communication complexity of metering schemes realizing general access structures.
Chapter PDF
References
Blundo, C., De Bonis, A., Masucci, B.: Bounds and Constructions for Metering Schemes, Technical Report, Università di Salerno (October 1999)
Blundo, C., De Bonis, A., Masucci, B., Stinson, D.R.: Dynamic Multi-Threshold Metering Schemes, Technical Report CORR 2000-18, Centre for Applied Cryptographic Research, University of Waterloo (2000)
Brickell, E.F.: Some Ideal Secret Sharing Schemes. The Journal of Combinatorial Mathematics and Combinatorial Computing 6, 105–113 (1989)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, Chichester (1991)
De Bonis, A., Masucci, B.: An Information Theoretic Approach to Metering Schemes. To appear in IEEE International Symposium on Information Theory, ISIT 2000 (2000)
Franklin, M., Malkhi, D.: Auditable Metering with Lightweight Security. Journal of Computer Security 6(4), 225–237 (1998)
Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Secret Sharing in Multilevel and Compartmented Groups. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 367–378. Springer, Heidelberg (1998)
Masucci, B., Stinson, D.R.: Efficient Metering Schemes with Pricing, Technical Report CORR 2000-06, Centre for Applied Cryptographic Research, University of Waterloo (2000)
Naor, M., Pinkas, B.: Secure and Efficient Metering. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 576–590. Springer, Heidelberg (1998)
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)
Simmons, G.J.: How to (Really) Share a Secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 390–448. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Masucci, B., Stinson, D.R. (2000). Metering Schemes for General Access Structures. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds) Computer Security - ESORICS 2000. ESORICS 2000. Lecture Notes in Computer Science, vol 1895. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10722599_5
Download citation
DOI: https://doi.org/10.1007/10722599_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41031-7
Online ISBN: 978-3-540-45299-7
eBook Packages: Springer Book Archive