A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials
Several key management schemes for dynamic access control in a user hierarchy are proposed in the literature based on elliptic curve cryptosystem (ECC) and polynomial interpolation. Since the elliptic curve scalar multiplication and construction of interpolating polynomials are time-consuming operations, most of the proposed schemes require high storage and computational complexity. Further, most of the proposed schemes are vulnerable to different attacks including the man-in-the-middle attacks. In this paper, we propose a novel key management scheme for hierarchical access control based on linear polynomials only. We show that our scheme is secure against different attacks including the man-in-the-middle attack, which are required for an idle access control scheme. Moreover, the computational cost and the storage space are significantly reduced in our scheme while compared to the recently proposed related schemes.
Unable to display preview. Download preview PDF.
- 1.Advanced Encryption Standard: FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
- 3.Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), Article 18, 198–208 (2009)Google Scholar
- 4.Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security (CCS 2005), pp. 190–202 (2005)Google Scholar
- 10.Nikooghadam, M., Zakerolhosseini, A.: Secure Communication of Medical Information Using Mobile Agents. Journal of Medical Systems (2012), doi:10.1007/s10916-012-9857-8Google Scholar
- 12.Secure Hash Standard: FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (April 1995)Google Scholar
- 13.Wu, S., Chen, K.: An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. Journal of Medical Systems (2011), doi:10.1007/s10916-011-9700-7Google Scholar