Skip to main content
Erschienen in: Wireless Personal Communications 4/2015

01.12.2015

A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems

verfasst von: Victor R. L. Shen, Wei-Chieh Huang

Erschienen in: Wireless Personal Communications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we have adopted elliptic curve multiplication operation, ID-based character in bilinear pairing, one-way hash function, and time access control to construct a time-bound hierarchical access control and key management scheme for multicast systems. In this scheme, central authority distributes a group key for every security class (SC) and a time-bound secret key for each member of security class. With its time-bound secret key, each member in SC can obtain a group key to decrypt the message and thereof utilize the group key to attain the group keys for successors so as to decrypt their data sets. Considering many common ways of dynamic access control, namely, a new member joining in the security class, an existing member departing from a security class, replacing time-bound key, increasing security class, decreasing security class, replacing group key, adding relationship and deleting relationship among SCs, all of them are explicitly discussed in this paper. In view of the security and performance analyses under many typical attacks, we thereby prove our proposed scheme can prevent malicious attacks effectively with less computation time and more reasonable complexity. In consequence, the proposed scheme offers a secure and hierarchical access control in multicast systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3), 239–248.CrossRef Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3), 239–248.CrossRef
2.
Zurück zum Zitat Alcaraz, C., Lopez, J., Roman, R., & Chen, H.-H. (2012). Selecting key management schemes for WSN applications. Computers and Security, 31(8), 956–966.CrossRef Alcaraz, C., Lopez, J., Roman, R., & Chen, H.-H. (2012). Selecting key management schemes for WSN applications. Computers and Security, 31(8), 956–966.CrossRef
3.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from Weil pairing. In Advances in Cryptology-proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139 (pp. 213–229). Boneh, D., & Franklin, M. (2001). Identity-based encryption from Weil pairing. In Advances in Cryptology-proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139 (pp. 213–229).
4.
Zurück zum Zitat Chang, C. C., Hwang, R. J., & Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3), 243–247.CrossRef Chang, C. C., Hwang, R. J., & Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3), 243–247.CrossRef
5.
Zurück zum Zitat Chen, H. Y. (2004). Efficient time bound hierarchical key assignment scheme. IEEE Transaction on Knowledge and Data Engineering, 16(10), 1302–1304. Chen, H. Y. (2004). Efficient time bound hierarchical key assignment scheme. IEEE Transaction on Knowledge and Data Engineering, 16(10), 1302–1304.
6.
Zurück zum Zitat Hu, G., Han, L., Wang, Z., & Xia, X. (2013). Cryptanalysis and improvement of a certificateless threshold signature secure in standard model. Information Sciences, 247(20), 174–187.MathSciNetCrossRef Hu, G., Han, L., Wang, Z., & Xia, X. (2013). Cryptanalysis and improvement of a certificateless threshold signature secure in standard model. Information Sciences, 247(20), 174–187.MathSciNetCrossRef
7.
Zurück zum Zitat Hwang, M. S., & Lin, I. C. (2008). Introduction to information and network security (2nd ed.). New York: McGraw-Hill International Enterprises. Hwang, M. S., & Lin, I. C. (2008). Introduction to information and network security (2nd ed.). New York: McGraw-Hill International Enterprises.
8.
Zurück zum Zitat Koblitz, N. (1987). Elliptic curve cryptosystems, Mathematics of Computation, 48, 203–209. Koblitz, N. (1987). Elliptic curve cryptosystems, Mathematics of Computation, 48, 203–209.
9.
Zurück zum Zitat Lehman, L. H., Garland, S. J., & Tennenhouse, D. L. (1998). Active reliable multicast. In IEEE INFOCOM’98, San Francisco, USA (Vol. 2, pp. 581–589). Lehman, L. H., Garland, S. J., & Tennenhouse, D. L. (1998). Active reliable multicast. In IEEE INFOCOM’98, San Francisco, USA (Vol. 2, pp. 581–589).
10.
Zurück zum Zitat Lu, H. (2005). A novel high-order tree for secure multicast key management. IEEE Transaction on Computers, 54(2), 214–224.CrossRef Lu, H. (2005). A novel high-order tree for secure multicast key management. IEEE Transaction on Computers, 54(2), 214–224.CrossRef
11.
Zurück zum Zitat Perrig, A., Canetti, R., Song, D., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In Proceedings of the symposium on network and distributed systems security (NDSS 2001) (pp. 35–46). Perrig, A., Canetti, R., Song, D., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In Proceedings of the symposium on network and distributed systems security (NDSS 2001) (pp. 35–46).
12.
Zurück zum Zitat Qin, B., Wu, Q., Zhang, L., Farras, O., & Domingo-Ferrer, J. (2012). Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Information Sciences, 210(25), 67–80.MathSciNetCrossRefMATH Qin, B., Wu, Q., Zhang, L., Farras, O., & Domingo-Ferrer, J. (2012). Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Information Sciences, 210(25), 67–80.MathSciNetCrossRefMATH
13.
Zurück zum Zitat Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRefMATH Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRefMATH
14.
Zurück zum Zitat Shang, N., & Wagstaff Jr., S. (2008). An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Transactions on Dependable and Secure Computing, 5(2), 100–108. Shang, N., & Wagstaff Jr., S. (2008). An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Transactions on Dependable and Secure Computing, 5(2), 100–108.
15.
Zurück zum Zitat Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers and Security, 31(8), 897–911.CrossRef Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers and Security, 31(8), 897–911.CrossRef
16.
Zurück zum Zitat Shen, V. R. L., & Chen, T. S. (2002). A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 2(2), 164–171.CrossRef Shen, V. R. L., & Chen, T. S. (2002). A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 2(2), 164–171.CrossRef
17.
Zurück zum Zitat Stoica, I., Morris, R., Nowell, L., Karger, R., Kaashoek, M., Dabek, F., & Balakrishnan, H. (2003). Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11, 210–222. Stoica, I., Morris, R., Nowell, L., Karger, R., Kaashoek, M., Dabek, F., & Balakrishnan, H. (2003). Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11, 210–222.
18.
Zurück zum Zitat Tian, Y., Ma, J., Peng, C., Wang, Y., & Zhang, L. (2013). A rational framework for secure communication. Information Sciences, 250(20), 215–226.MathSciNetCrossRef Tian, Y., Ma, J., Peng, C., Wang, Y., & Zhang, L. (2013). A rational framework for secure communication. Information Sciences, 250(20), 215–226.MathSciNetCrossRef
19.
Zurück zum Zitat Yi, X. (2005). Security of Chen’s efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 17(9), 1298–1299.CrossRef Yi, X. (2005). Security of Chen’s efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 17(9), 1298–1299.CrossRef
Metadaten
Titel
A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
verfasst von
Victor R. L. Shen
Wei-Chieh Huang
Publikationsdatum
01.12.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2865-5

Weitere Artikel der Ausgabe 4/2015

Wireless Personal Communications 4/2015 Zur Ausgabe

Neuer Inhalt