Abstract
In this paper, we have adopted elliptic curve multiplication operation, ID-based character in bilinear pairing, one-way hash function, and time access control to construct a time-bound hierarchical access control and key management scheme for multicast systems. In this scheme, central authority distributes a group key for every security class (SC) and a time-bound secret key for each member of security class. With its time-bound secret key, each member in SC can obtain a group key to decrypt the message and thereof utilize the group key to attain the group keys for successors so as to decrypt their data sets. Considering many common ways of dynamic access control, namely, a new member joining in the security class, an existing member departing from a security class, replacing time-bound key, increasing security class, decreasing security class, replacing group key, adding relationship and deleting relationship among SCs, all of them are explicitly discussed in this paper. In view of the security and performance analyses under many typical attacks, we thereby prove our proposed scheme can prevent malicious attacks effectively with less computation time and more reasonable complexity. In consequence, the proposed scheme offers a secure and hierarchical access control in multicast systems.
Similar content being viewed by others
References
Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3), 239–248.
Alcaraz, C., Lopez, J., Roman, R., & Chen, H.-H. (2012). Selecting key management schemes for WSN applications. Computers and Security, 31(8), 956–966.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from Weil pairing. In Advances in Cryptology-proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139 (pp. 213–229).
Chang, C. C., Hwang, R. J., & Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3), 243–247.
Chen, H. Y. (2004). Efficient time bound hierarchical key assignment scheme. IEEE Transaction on Knowledge and Data Engineering, 16(10), 1302–1304.
Hu, G., Han, L., Wang, Z., & Xia, X. (2013). Cryptanalysis and improvement of a certificateless threshold signature secure in standard model. Information Sciences, 247(20), 174–187.
Hwang, M. S., & Lin, I. C. (2008). Introduction to information and network security (2nd ed.). New York: McGraw-Hill International Enterprises.
Koblitz, N. (1987). Elliptic curve cryptosystems, Mathematics of Computation, 48, 203–209.
Lehman, L. H., Garland, S. J., & Tennenhouse, D. L. (1998). Active reliable multicast. In IEEE INFOCOM’98, San Francisco, USA (Vol. 2, pp. 581–589).
Lu, H. (2005). A novel high-order tree for secure multicast key management. IEEE Transaction on Computers, 54(2), 214–224.
Perrig, A., Canetti, R., Song, D., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In Proceedings of the symposium on network and distributed systems security (NDSS 2001) (pp. 35–46).
Qin, B., Wu, Q., Zhang, L., Farras, O., & Domingo-Ferrer, J. (2012). Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Information Sciences, 210(25), 67–80.
Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120–126.
Shang, N., & Wagstaff Jr., S. (2008). An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Transactions on Dependable and Secure Computing, 5(2), 100–108.
Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers and Security, 31(8), 897–911.
Shen, V. R. L., & Chen, T. S. (2002). A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 2(2), 164–171.
Stoica, I., Morris, R., Nowell, L., Karger, R., Kaashoek, M., Dabek, F., & Balakrishnan, H. (2003). Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11, 210–222.
Tian, Y., Ma, J., Peng, C., Wang, Y., & Zhang, L. (2013). A rational framework for secure communication. Information Sciences, 250(20), 215–226.
Yi, X. (2005). Security of Chen’s efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 17(9), 1298–1299.
Acknowledgments
The authors are very grateful to the anonymous reviewers for their constructive comments which have improved the quality of this paper. This work was supported by the Ministry of Science and Technology, Taiwan, under Grant MOST 103-2221-E-305-015.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shen, V.R.L., Huang, WC. A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems. Wireless Pers Commun 85, 1741–1764 (2015). https://doi.org/10.1007/s11277-015-2865-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2865-5