Skip to main content
Log in

A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we have adopted elliptic curve multiplication operation, ID-based character in bilinear pairing, one-way hash function, and time access control to construct a time-bound hierarchical access control and key management scheme for multicast systems. In this scheme, central authority distributes a group key for every security class (SC) and a time-bound secret key for each member of security class. With its time-bound secret key, each member in SC can obtain a group key to decrypt the message and thereof utilize the group key to attain the group keys for successors so as to decrypt their data sets. Considering many common ways of dynamic access control, namely, a new member joining in the security class, an existing member departing from a security class, replacing time-bound key, increasing security class, decreasing security class, replacing group key, adding relationship and deleting relationship among SCs, all of them are explicitly discussed in this paper. In view of the security and performance analyses under many typical attacks, we thereby prove our proposed scheme can prevent malicious attacks effectively with less computation time and more reasonable complexity. In consequence, the proposed scheme offers a secure and hierarchical access control in multicast systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3), 239–248.

    Article  Google Scholar 

  2. Alcaraz, C., Lopez, J., Roman, R., & Chen, H.-H. (2012). Selecting key management schemes for WSN applications. Computers and Security, 31(8), 956–966.

    Article  Google Scholar 

  3. Boneh, D., & Franklin, M. (2001). Identity-based encryption from Weil pairing. In Advances in Cryptology-proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139 (pp. 213–229).

  4. Chang, C. C., Hwang, R. J., & Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3), 243–247.

    Article  Google Scholar 

  5. Chen, H. Y. (2004). Efficient time bound hierarchical key assignment scheme. IEEE Transaction on Knowledge and Data Engineering, 16(10), 1302–1304.

    Google Scholar 

  6. Hu, G., Han, L., Wang, Z., & Xia, X. (2013). Cryptanalysis and improvement of a certificateless threshold signature secure in standard model. Information Sciences, 247(20), 174–187.

    Article  MathSciNet  Google Scholar 

  7. Hwang, M. S., & Lin, I. C. (2008). Introduction to information and network security (2nd ed.). New York: McGraw-Hill International Enterprises.

    Google Scholar 

  8. Koblitz, N. (1987). Elliptic curve cryptosystems, Mathematics of Computation, 48, 203–209.

  9. Lehman, L. H., Garland, S. J., & Tennenhouse, D. L. (1998). Active reliable multicast. In IEEE INFOCOM’98, San Francisco, USA (Vol. 2, pp. 581–589).

  10. Lu, H. (2005). A novel high-order tree for secure multicast key management. IEEE Transaction on Computers, 54(2), 214–224.

    Article  Google Scholar 

  11. Perrig, A., Canetti, R., Song, D., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In Proceedings of the symposium on network and distributed systems security (NDSS 2001) (pp. 35–46).

  12. Qin, B., Wu, Q., Zhang, L., Farras, O., & Domingo-Ferrer, J. (2012). Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Information Sciences, 210(25), 67–80.

    Article  MathSciNet  MATH  Google Scholar 

  13. Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  14. Shang, N., & Wagstaff Jr., S. (2008). An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Transactions on Dependable and Secure Computing, 5(2), 100–108.

  15. Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers and Security, 31(8), 897–911.

    Article  Google Scholar 

  16. Shen, V. R. L., & Chen, T. S. (2002). A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 2(2), 164–171.

    Article  Google Scholar 

  17. Stoica, I., Morris, R., Nowell, L., Karger, R., Kaashoek, M., Dabek, F., & Balakrishnan, H. (2003). Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11, 210–222.

  18. Tian, Y., Ma, J., Peng, C., Wang, Y., & Zhang, L. (2013). A rational framework for secure communication. Information Sciences, 250(20), 215–226.

    Article  MathSciNet  Google Scholar 

  19. Yi, X. (2005). Security of Chen’s efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 17(9), 1298–1299.

    Article  Google Scholar 

Download references

Acknowledgments

The authors are very grateful to the anonymous reviewers for their constructive comments which have improved the quality of this paper. This work was supported by the Ministry of Science and Technology, Taiwan, under Grant MOST 103-2221-E-305-015.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Victor R. L. Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, V.R.L., Huang, WC. A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems. Wireless Pers Commun 85, 1741–1764 (2015). https://doi.org/10.1007/s11277-015-2865-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2865-5

Keywords

Navigation