• DocumentCode
    2431763
  • Title

    Secure key management scheme for hierarchical access control based on ECC

  • Author

    Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung

  • Author_Institution
    Dept. of Inf. Manage., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan
  • fYear
    2009
  • fDate
    5-8 Oct. 2009
  • Firstpage
    335
  • Lastpage
    338
  • Abstract
    In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.
  • Keywords
    authorisation; public key cryptography; ECC; Jang-Wang scheme; elliptic curve cryptosystem; hierarchical access control; secure key management scheme; security leak elimination; Access control; Computer network management; Computer networks; Elliptic curve cryptography; Elliptic curves; Information management; Information security; Interpolation; Polynomials; Technology management; Elliptic curve; Hierarchical Access control; Key management; Polynomial interpolation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on
  • Conference_Location
    Zurich
  • Print_ISBN
    978-1-4244-4169-3
  • Electronic_ISBN
    978-1-4244-4170-9
  • Type

    conf

  • DOI
    10.1109/CCST.2009.5335515
  • Filename
    5335515