An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
Journal: International Journal of Communication Network and Security (Vol.1, No. 2)Publication Date: 2013-09-26
Authors : Laxminath Tripathy; Nayan Ranjan Paul;
Page : 50-55
Keywords : Key management; Elliptic curve; Dynamic Exterior attacks; Hierarchical Access control; Security;
Abstract
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic access problems. However, in this paper, we propose an attack on Jeng-Wang scheme to show that Jeng-Wang scheme is insecure against our proposed attack. We show that in our proposed attack, an attacker (adversary) who is not a user in any security class in a user hierarchy attempts to derive the secret key of a security class .
Other Latest Articles
- A Novel approach for Privacy Preserving in Video using Extended Euclidean algorithm Based on Chinese remainder theorem
- Star varietal cube: A New Large Scale Parallel Interconnection Network
- An Efficient Approach Formulation of Social Groups of User Calls of GSM
- Secure Biometric Cryptosystem for Distributed System
- Performance Analysis Of Secured Synchronous Stream Ciphers
Last modified: 2013-09-26 13:25:44