Abstract
We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and security weakness. We show that our scheme is secure and efficient in comparisons to the Shen and Chen's scheme.
- D. Bell and L. L. Padula. Secure Computer Systems-Unified Exposition and Multics Interpretation. MTR-2997, ESD-TR-75-306, The MITRE Corporation, Bedford, MA, 1975.Google Scholar
- V. R. Shen and T. S. Chen. A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. Computers & Security, 21(2):164--171, 2002.Google ScholarDigital Library
- W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. on Info. Theory, IT-22(6):644--654, 1976.Google ScholarDigital Library
- C. L. Hsu and T. S. Wu. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers & Security, 22(5):453--456, 2003.Google ScholarDigital Library
- S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. on Computer System, 1(3):239--247, 1983. Google ScholarDigital Library
- S. T. MacKinnon, P. D. Taylor, H. Meijer and S. G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. on Computers, C-34(9):797--802, 1985. Google ScholarDigital Library
- L. Harn and H. Y. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9(6):539--546, 1990. Google ScholarDigital Library
- C. C. Chang, R. J. Hwang and T. C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243--247, 1992. Google ScholarDigital Library
- C. C. Chang and D. J. Buehrer. Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications, 26(5):71--76, 1993.Google ScholarCross Ref
- G. C. Chick and S. E. Tavares. Flexible access control with master keys. In Proc. of CRYPTO'89, LNCS #435, pages 316--322, 1990. Google ScholarDigital Library
- R. S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letter, 27(2):95--98, 1988. Google ScholarDigital Library
- H. M. Tsai and C. C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14(2):857--959, 1995.Google Scholar
- J. B. Scarborough. Numerical Mathematical Analysis. Oxford and IBH Publishing Co. Pvt. Ltd, 1966.Google Scholar
- B. Schneier. Applied Cryptography. John Wiley & Sons Inc., 1996Google Scholar
- D. E. Knuth. The Art of Computer Programming, Seminumerical algorithms. Addison-Wesley, Boston, 1999. Google ScholarDigital Library
Index Terms
- Hierarchical key management scheme using polynomial interpolation
Recommendations
Private Key Management in Hierarchical Identity-Based Encryption
SITIS '07: Proceedings of the 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based SystemHierarchical Identity-Based Encryption (HIBE) is a generalization of IBE that mirrors an organizational hierarchy, which consists of a root private key generator (PKG), domain PKGs and users. In a traditional HIBE system, users retrieve private keys ...
Time-based key management in attribute-based encryption using piecewise key generation
Key management is essential in using attribute-based encryption (ABE) for dynamic access control in the practical world. Although user or key delegation has been widely discussed for ABE, it cannot solve all the key management problems. In this paper, we ...
An Efficient Key Management Scheme for Pervasive Computing
ISM '05: Proceedings of the Seventh IEEE International Symposium on MultimediaIn this paper we propose a variant of RSA public key scheme, called "Hidden Exponent RSA". Based on this new scheme, we devised an efficient key distribution/ management scheme for secure communication among devices in the context of pervasive computing,...
Comments