Yu-Li Lina, Chien-Lung Hsu, Tzong-Chen Wu, So-Lin Yen, C. Tseng
{"title":"基于ECC分层访问控制的安全密钥管理方案","authors":"Yu-Li Lina, Chien-Lung Hsu, Tzong-Chen Wu, So-Lin Yen, C. Tseng","doi":"10.1109/CCST.2009.5335515","DOIUrl":null,"url":null,"abstract":"In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure key management scheme for hierarchical access control based on ECC\",\"authors\":\"Yu-Li Lina, Chien-Lung Hsu, Tzong-Chen Wu, So-Lin Yen, C. Tseng\",\"doi\":\"10.1109/CCST.2009.5335515\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.\",\"PeriodicalId\":117285,\"journal\":{\"name\":\"43rd Annual 2009 International Carnahan Conference on Security Technology\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"43rd Annual 2009 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2009.5335515\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"43rd Annual 2009 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2009.5335515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure key management scheme for hierarchical access control based on ECC
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.