Secure key management scheme for hierarchical access control based on ECC
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a co...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 338 |
---|---|
container_issue | |
container_start_page | 335 |
container_title | |
container_volume | |
creator | Lin, Yu-Li Hsu, Chien-Lung Wu, Tzong-Chen Yen, So-Lin Tseng, Chin-Lung |
description | In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak. |
doi_str_mv | 10.1109/CCST.2009.5335515 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5335515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5335515</ieee_id><sourcerecordid>5335515</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c3d20021e54bac1beccfa5f5543ed6753c485a10710c2d34ca8def95ec54cbe93</originalsourceid><addsrcrecordid>eNo9UE1Lw0AUXD8KxtofIF72D6Tux3ub7lFC1ULBQ3svm5cXE20S2a2H_nsrFucyAwPDzAhxr9Vca-Ufy3KznRul_BytRdR4IW41GADQhXKXIjMaba4KMFf_hvPmWmRaFTp3WJiJyAqfOwBn1Y2YpfShTgA0C-0ysdowfUeWn3yUfRjCO_c8HGSi9iRkM0bZdhxDpLajsJeBiFOSNA6HOO5lFRLXchzksizvxKQJ-8SzM0_F9nm5LV_z9dvLqnxa551Xh5xsfZpjNCNUgXTFRE3ABhEs165AS7DA8FtekaktUFjU3HhkQqCKvZ2Kh7_Yjpl3X7HrQzzuzu_YH1GpUos</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure key management scheme for hierarchical access control based on ECC</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung</creator><creatorcontrib>Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung</creatorcontrib><description>In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 1424441692</identifier><identifier>ISBN: 9781424441693</identifier><identifier>EISSN: 2153-0742</identifier><identifier>EISBN: 1424441706</identifier><identifier>EISBN: 9781424441709</identifier><identifier>DOI: 10.1109/CCST.2009.5335515</identifier><identifier>LCCN: 79-644630</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Computer network management ; Computer networks ; Elliptic curve ; Elliptic curve cryptography ; Elliptic curves ; Hierarchical Access control ; Information management ; Information security ; Interpolation ; Key management ; Polynomial interpolation ; Polynomials ; Technology management</subject><ispartof>43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, p.335-338</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5335515$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5335515$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lin, Yu-Li</creatorcontrib><creatorcontrib>Hsu, Chien-Lung</creatorcontrib><creatorcontrib>Wu, Tzong-Chen</creatorcontrib><creatorcontrib>Yen, So-Lin</creatorcontrib><creatorcontrib>Tseng, Chin-Lung</creatorcontrib><title>Secure key management scheme for hierarchical access control based on ECC</title><title>43rd Annual 2009 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.</description><subject>Access control</subject><subject>Computer network management</subject><subject>Computer networks</subject><subject>Elliptic curve</subject><subject>Elliptic curve cryptography</subject><subject>Elliptic curves</subject><subject>Hierarchical Access control</subject><subject>Information management</subject><subject>Information security</subject><subject>Interpolation</subject><subject>Key management</subject><subject>Polynomial interpolation</subject><subject>Polynomials</subject><subject>Technology management</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>1424441692</isbn><isbn>9781424441693</isbn><isbn>1424441706</isbn><isbn>9781424441709</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9UE1Lw0AUXD8KxtofIF72D6Tux3ub7lFC1ULBQ3svm5cXE20S2a2H_nsrFucyAwPDzAhxr9Vca-Ufy3KznRul_BytRdR4IW41GADQhXKXIjMaba4KMFf_hvPmWmRaFTp3WJiJyAqfOwBn1Y2YpfShTgA0C-0ysdowfUeWn3yUfRjCO_c8HGSi9iRkM0bZdhxDpLajsJeBiFOSNA6HOO5lFRLXchzksizvxKQJ-8SzM0_F9nm5LV_z9dvLqnxa551Xh5xsfZpjNCNUgXTFRE3ABhEs165AS7DA8FtekaktUFjU3HhkQqCKvZ2Kh7_Yjpl3X7HrQzzuzu_YH1GpUos</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Lin, Yu-Li</creator><creator>Hsu, Chien-Lung</creator><creator>Wu, Tzong-Chen</creator><creator>Yen, So-Lin</creator><creator>Tseng, Chin-Lung</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200910</creationdate><title>Secure key management scheme for hierarchical access control based on ECC</title><author>Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c3d20021e54bac1beccfa5f5543ed6753c485a10710c2d34ca8def95ec54cbe93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Computer network management</topic><topic>Computer networks</topic><topic>Elliptic curve</topic><topic>Elliptic curve cryptography</topic><topic>Elliptic curves</topic><topic>Hierarchical Access control</topic><topic>Information management</topic><topic>Information security</topic><topic>Interpolation</topic><topic>Key management</topic><topic>Polynomial interpolation</topic><topic>Polynomials</topic><topic>Technology management</topic><toplevel>online_resources</toplevel><creatorcontrib>Lin, Yu-Li</creatorcontrib><creatorcontrib>Hsu, Chien-Lung</creatorcontrib><creatorcontrib>Wu, Tzong-Chen</creatorcontrib><creatorcontrib>Yen, So-Lin</creatorcontrib><creatorcontrib>Tseng, Chin-Lung</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lin, Yu-Li</au><au>Hsu, Chien-Lung</au><au>Wu, Tzong-Chen</au><au>Yen, So-Lin</au><au>Tseng, Chin-Lung</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure key management scheme for hierarchical access control based on ECC</atitle><btitle>43rd Annual 2009 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2009-10</date><risdate>2009</risdate><spage>335</spage><epage>338</epage><pages>335-338</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>1424441692</isbn><isbn>9781424441693</isbn><eisbn>1424441706</eisbn><eisbn>9781424441709</eisbn><abstract>In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.</abstract><pub>IEEE</pub><doi>10.1109/CCST.2009.5335515</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1071-6572 |
ispartof | 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, p.335-338 |
issn | 1071-6572 2153-0742 |
language | eng |
recordid | cdi_ieee_primary_5335515 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Computer network management Computer networks Elliptic curve Elliptic curve cryptography Elliptic curves Hierarchical Access control Information management Information security Interpolation Key management Polynomial interpolation Polynomials Technology management |
title | Secure key management scheme for hierarchical access control based on ECC |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T07%3A34%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20key%20management%20scheme%20for%20hierarchical%20access%20control%20based%20on%20ECC&rft.btitle=43rd%20Annual%202009%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Lin,%20Yu-Li&rft.date=2009-10&rft.spage=335&rft.epage=338&rft.pages=335-338&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=1424441692&rft.isbn_list=9781424441693&rft_id=info:doi/10.1109/CCST.2009.5335515&rft_dat=%3Cieee_6IE%3E5335515%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424441706&rft.eisbn_list=9781424441709&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5335515&rfr_iscdi=true |