An Efficient Key Management Scheme for Access Control in a User Hierarchy

Author(s):  
Jianmin Zhang ◽  
Jian Li ◽  
Xiande Liu
Author(s):  
Laxminath Tripathy ◽  
Nayan Ranjan Paul

In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic access problems. However, in this paper, we propose an attack on Jeng-Wang scheme to show that Jeng-Wang scheme is insecure against our proposed attack. We show that in our proposed attack, an attacker (adversary) who is not a user in any security class in a user hierarchy attempts to derive the secret key of a security class .


2012 ◽  
Vol 56 (8) ◽  
pp. 2107-2118 ◽  
Author(s):  
Hani Ragab Hassen ◽  
Hatem Bettahar ◽  
Abdalmadjid Bouadbdallah ◽  
Yacine Challal

Author(s):  
K. V. Rajesh ◽  
P. Harini

Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient key management to distribute and change keys is in great demand for access control in broadcast services. In this paper, we propose an efficient key management scheme (namely KTR) to key distribution with regarding to complex subscription options and user activities. KTR has the following advantages. First, it supports all subscription activities in wireless broadcast services. Second, in KTR, a user only needs to hold one set of keys for all subscribed programs, instead of separate sets of keys for each program. Third, KTR identifies the minimum set of keys that must be changed to ensure broadcast security and minimize the rekey cost. Our simulations show that KTR can save about 45% of communication overhead in the broadcast channel and about 50% of decryption cost for each user, compared with logical key hierarchy based approaches.


Sign in / Sign up

Export Citation Format

Share Document