DocumentCode :
676785
Title :
Secure authorization for controlling access via key management scheme
Author :
Tsung-Chih Hsiao ; Tzer-Long Chen ; Chih-Sheng Chen ; Fu-Sheng Xu ; Tsui, Starlition ; Yu-Fang Chung ; Tzer-Shyong Chen
Author_Institution :
Coll. of Comput. Sci. & Technol., Huaqiao Univ., Xiamen, China
fYear :
2013
fDate :
22-25 Oct. 2013
Firstpage :
1
Lastpage :
4
Abstract :
With the rapid development of the Internet, many users start to take action putting personal or company information on it, and share with everyone. The Internet is public as it were, if we do not control its limit of authority to assure security, it´s possible that those attackers do illegal access of important information and destroy them. Not only personal privacy is invaded, but the mass property damage. Therefore, effective access control system has been more and more emphasized these days. To fight against these network attacks, it is necessary to establish an effective and safe access control system; here we proposed a scheme, a key management which called Lagrange interpolation mainly takes access control model as framework, and use Elliptic Curve Cryptography system to enhance security. The fact we choose Lagrange interpolation is the key we use is randomized, no relationship between each key, so is relatively hard. As Elliptic Curve Cryptography system, we want attackers to encounter Elliptic Curve Discrete Logarithm Problem. Once the prime number is big enough, attackers will have trouble deciphering the key. Access control is so comprehensive, such as electronic documents, online television system sand wireless networks and so on, from previous literature; mobile agent technology applied in access control and key management would waste space and do exist some flaws in security, also we still have a lot of works to do on medical application. Hence, we propose these schemes in mobile agent in order to reach improvement, and then analyze of security and try to simulate what attackers will do. We conclude four common attacks: External Collective Attack, Internal Attack, Collusion Attacks and Equation Breaking Attack. As results, attackers are hard to decipher the key because of no relationship between each key and will face Elliptic Curve Discrete Logarithm Problem. We confirm that the proposed schemes can be more efficiently and safety to protect mobile ag- nt.
Keywords :
authorisation; interpolation; mobile agents; public key cryptography; Internet; Lagrange interpolation; access control system; authorization; collusion attacks; elliptic curve cryptography system; elliptic curve discrete logarithm problem; equation breaking attack; external collective attack; internal attack; key management scheme; medical application; mobile agent technology; network attacks; prime number; security assurance; Access control; Educational institutions; Interpolation; Medical services; Mobile agents; Polynomials; Access Control; Elliptic Curve Cryptography; Key Management; Lagrange Interpolation; Mobile Agent;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
TENCON 2013 - 2013 IEEE Region 10 Conference (31194)
Conference_Location :
Xi´an
ISSN :
2159-3442
Print_ISBN :
978-1-4799-2825-5
Type :
conf
DOI :
10.1109/TENCON.2013.6719045
Filename :
6719045
Link To Document :
بازگشت