z-logo
open-access-imgOpen Access
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
Author(s) -
Laxminath Tripathy,
Nayan Ranjan Paul
Publication year - 2011
Publication title -
international journal of communication networks and security
Language(s) - English
Resource type - Journals
ISSN - 2231-1882
DOI - 10.47893/ijcns.2011.1020
Subject(s) - computer science , key management , cryptosystem , scheme (mathematics) , hierarchy , key (lock) , cryptography , access control , computer security , hybrid cryptosystem , class (philosophy) , adversary , mathematics , mathematical analysis , artificial intelligence , economics , market economy
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic access problems. However, in this paper, we propose an attack on Jeng-Wang scheme to show that Jeng-Wang scheme is insecure against our proposed attack. We show that in our proposed attack, an attacker (adversary) who is not a user in any security class in a user hierarchy attempts to derive the secret key of a security class .

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here