DocumentCode :
2431763
Title :
Secure key management scheme for hierarchical access control based on ECC
Author :
Lin, Yu-Li ; Hsu, Chien-Lung ; Wu, Tzong-Chen ; Yen, So-Lin ; Tseng, Chin-Lung
Author_Institution :
Dept. of Inf. Manage., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan
fYear :
2009
fDate :
5-8 Oct. 2009
Firstpage :
335
Lastpage :
338
Abstract :
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.
Keywords :
authorisation; public key cryptography; ECC; Jang-Wang scheme; elliptic curve cryptosystem; hierarchical access control; secure key management scheme; security leak elimination; Access control; Computer network management; Computer networks; Elliptic curve cryptography; Elliptic curves; Information management; Information security; Interpolation; Polynomials; Technology management; Elliptic curve; Hierarchical Access control; Key management; Polynomial interpolation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on
Conference_Location :
Zurich
Print_ISBN :
978-1-4244-4169-3
Electronic_ISBN :
978-1-4244-4170-9
Type :
conf
DOI :
10.1109/CCST.2009.5335515
Filename :
5335515
Link To Document :
بازگشت