Secure key management scheme for hierarchical access control based on ECC

In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lin, Yu-Li, Hsu, Chien-Lung, Wu, Tzong-Chen, Yen, So-Lin, Tseng, Chin-Lung
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 338
container_issue
container_start_page 335
container_title
container_volume
creator Lin, Yu-Li
Hsu, Chien-Lung
Wu, Tzong-Chen
Yen, So-Lin
Tseng, Chin-Lung
description In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.
doi_str_mv 10.1109/CCST.2009.5335515
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5335515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5335515</ieee_id><sourcerecordid>5335515</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c3d20021e54bac1beccfa5f5543ed6753c485a10710c2d34ca8def95ec54cbe93</originalsourceid><addsrcrecordid>eNo9UE1Lw0AUXD8KxtofIF72D6Tux3ub7lFC1ULBQ3svm5cXE20S2a2H_nsrFucyAwPDzAhxr9Vca-Ufy3KznRul_BytRdR4IW41GADQhXKXIjMaba4KMFf_hvPmWmRaFTp3WJiJyAqfOwBn1Y2YpfShTgA0C-0ysdowfUeWn3yUfRjCO_c8HGSi9iRkM0bZdhxDpLajsJeBiFOSNA6HOO5lFRLXchzksizvxKQJ-8SzM0_F9nm5LV_z9dvLqnxa551Xh5xsfZpjNCNUgXTFRE3ABhEs165AS7DA8FtekaktUFjU3HhkQqCKvZ2Kh7_Yjpl3X7HrQzzuzu_YH1GpUos</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure key management scheme for hierarchical access control based on ECC</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung</creator><creatorcontrib>Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung</creatorcontrib><description>In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 1424441692</identifier><identifier>ISBN: 9781424441693</identifier><identifier>EISSN: 2153-0742</identifier><identifier>EISBN: 1424441706</identifier><identifier>EISBN: 9781424441709</identifier><identifier>DOI: 10.1109/CCST.2009.5335515</identifier><identifier>LCCN: 79-644630</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Computer network management ; Computer networks ; Elliptic curve ; Elliptic curve cryptography ; Elliptic curves ; Hierarchical Access control ; Information management ; Information security ; Interpolation ; Key management ; Polynomial interpolation ; Polynomials ; Technology management</subject><ispartof>43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, p.335-338</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5335515$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5335515$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lin, Yu-Li</creatorcontrib><creatorcontrib>Hsu, Chien-Lung</creatorcontrib><creatorcontrib>Wu, Tzong-Chen</creatorcontrib><creatorcontrib>Yen, So-Lin</creatorcontrib><creatorcontrib>Tseng, Chin-Lung</creatorcontrib><title>Secure key management scheme for hierarchical access control based on ECC</title><title>43rd Annual 2009 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.</description><subject>Access control</subject><subject>Computer network management</subject><subject>Computer networks</subject><subject>Elliptic curve</subject><subject>Elliptic curve cryptography</subject><subject>Elliptic curves</subject><subject>Hierarchical Access control</subject><subject>Information management</subject><subject>Information security</subject><subject>Interpolation</subject><subject>Key management</subject><subject>Polynomial interpolation</subject><subject>Polynomials</subject><subject>Technology management</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>1424441692</isbn><isbn>9781424441693</isbn><isbn>1424441706</isbn><isbn>9781424441709</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9UE1Lw0AUXD8KxtofIF72D6Tux3ub7lFC1ULBQ3svm5cXE20S2a2H_nsrFucyAwPDzAhxr9Vca-Ufy3KznRul_BytRdR4IW41GADQhXKXIjMaba4KMFf_hvPmWmRaFTp3WJiJyAqfOwBn1Y2YpfShTgA0C-0ysdowfUeWn3yUfRjCO_c8HGSi9iRkM0bZdhxDpLajsJeBiFOSNA6HOO5lFRLXchzksizvxKQJ-8SzM0_F9nm5LV_z9dvLqnxa551Xh5xsfZpjNCNUgXTFRE3ABhEs165AS7DA8FtekaktUFjU3HhkQqCKvZ2Kh7_Yjpl3X7HrQzzuzu_YH1GpUos</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Lin, Yu-Li</creator><creator>Hsu, Chien-Lung</creator><creator>Wu, Tzong-Chen</creator><creator>Yen, So-Lin</creator><creator>Tseng, Chin-Lung</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200910</creationdate><title>Secure key management scheme for hierarchical access control based on ECC</title><author>Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c3d20021e54bac1beccfa5f5543ed6753c485a10710c2d34ca8def95ec54cbe93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Computer network management</topic><topic>Computer networks</topic><topic>Elliptic curve</topic><topic>Elliptic curve cryptography</topic><topic>Elliptic curves</topic><topic>Hierarchical Access control</topic><topic>Information management</topic><topic>Information security</topic><topic>Interpolation</topic><topic>Key management</topic><topic>Polynomial interpolation</topic><topic>Polynomials</topic><topic>Technology management</topic><toplevel>online_resources</toplevel><creatorcontrib>Lin, Yu-Li</creatorcontrib><creatorcontrib>Hsu, Chien-Lung</creatorcontrib><creatorcontrib>Wu, Tzong-Chen</creatorcontrib><creatorcontrib>Yen, So-Lin</creatorcontrib><creatorcontrib>Tseng, Chin-Lung</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lin, Yu-Li</au><au>Hsu, Chien-Lung</au><au>Wu, Tzong-Chen</au><au>Yen, So-Lin</au><au>Tseng, Chin-Lung</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure key management scheme for hierarchical access control based on ECC</atitle><btitle>43rd Annual 2009 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2009-10</date><risdate>2009</risdate><spage>335</spage><epage>338</epage><pages>335-338</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>1424441692</isbn><isbn>9781424441693</isbn><eisbn>1424441706</eisbn><eisbn>9781424441709</eisbn><abstract>In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.</abstract><pub>IEEE</pub><doi>10.1109/CCST.2009.5335515</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1071-6572
ispartof 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, p.335-338
issn 1071-6572
2153-0742
language eng
recordid cdi_ieee_primary_5335515
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Computer network management
Computer networks
Elliptic curve
Elliptic curve cryptography
Elliptic curves
Hierarchical Access control
Information management
Information security
Interpolation
Key management
Polynomial interpolation
Polynomials
Technology management
title Secure key management scheme for hierarchical access control based on ECC
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T07%3A34%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20key%20management%20scheme%20for%20hierarchical%20access%20control%20based%20on%20ECC&rft.btitle=43rd%20Annual%202009%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Lin,%20Yu-Li&rft.date=2009-10&rft.spage=335&rft.epage=338&rft.pages=335-338&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=1424441692&rft.isbn_list=9781424441693&rft_id=info:doi/10.1109/CCST.2009.5335515&rft_dat=%3Cieee_6IE%3E5335515%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424441706&rft.eisbn_list=9781424441709&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5335515&rfr_iscdi=true