Secure key management scheme for hierarchical access control based on ECC

Yu Li Lin, Chien Lung Hsu*, Tzong Chen Wu, So Lin Yen, Chin Lung Tseng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.

Original languageEnglish
Title of host publicationProceedings - 43rd Annual 2009 International Carnahan Conference on Security Technology, ICCST 2009
Pages335-338
Number of pages4
DOIs
StatePublished - 2009
Externally publishedYes
Event43rd Annual 2009 International Carnahan Conference on Security Technology, ICCST 2009 - Zurich, Switzerland
Duration: 05 10 200908 10 2009

Publication series

NameProceedings - International Carnahan Conference on Security Technology
ISSN (Print)1071-6572

Conference

Conference43rd Annual 2009 International Carnahan Conference on Security Technology, ICCST 2009
Country/TerritorySwitzerland
CityZurich
Period05/10/0908/10/09

Keywords

  • Elliptic curve
  • Hierarchical access control, polynomial interpolation
  • Key management

Fingerprint

Dive into the research topics of 'Secure key management scheme for hierarchical access control based on ECC'. Together they form a unique fingerprint.

Cite this