A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials

  • Vanga Odelu
  • Ashok Kumar Das
  • Adrijit Goswami
Part of the Communications in Computer and Information Science book series (CCIS, volume 335)

Abstract

Several key management schemes for dynamic access control in a user hierarchy are proposed in the literature based on elliptic curve cryptosystem (ECC) and polynomial interpolation. Since the elliptic curve scalar multiplication and construction of interpolating polynomials are time-consuming operations, most of the proposed schemes require high storage and computational complexity. Further, most of the proposed schemes are vulnerable to different attacks including the man-in-the-middle attacks. In this paper, we propose a novel key management scheme for hierarchical access control based on linear polynomials only. We show that our scheme is secure against different attacks including the man-in-the-middle attack, which are required for an idle access control scheme. Moreover, the computational cost and the storage space are significantly reduced in our scheme while compared to the recently proposed related schemes.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Advanced Encryption Standard: FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  2. 2.
    Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (TOCS) 1(3), 239–248 (1983)CrossRefGoogle Scholar
  3. 3.
    Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), Article 18, 198–208 (2009)Google Scholar
  4. 4.
    Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security (CCS 2005), pp. 190–202 (2005)Google Scholar
  5. 5.
    Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S.: Access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences 178(1), 230–243 (2008)MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    Das, A.K., Paul, N.R., Tripathy, L.: Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences 209, 80–92 (2012)CrossRefGoogle Scholar
  7. 7.
    Jeng, F.G., Wang, C.M.: An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software 79(8), 1161–1167 (2006)CrossRefGoogle Scholar
  8. 8.
    Lin, Y.L., Hsu, C.L.: Secure key management scheme for dynamic hierarchical access control based on ECC. Journal of Systems and Software 84(4), 679–685 (2011)CrossRefGoogle Scholar
  9. 9.
    Lo, J.W., Hwang, M.S., Liu, C.H.: An efficient key assignment scheme for access control in a large leaf class hierarchy. Information Sciences 181(4), 917–925 (2011)MATHCrossRefGoogle Scholar
  10. 10.
    Nikooghadam, M., Zakerolhosseini, A.: Secure Communication of Medical Information Using Mobile Agents. Journal of Medical Systems (2012), doi:10.1007/s10916-012-9857-8Google Scholar
  11. 11.
    Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Journal of Systems and Software 83(10), 1917–1929 (2010)CrossRefGoogle Scholar
  12. 12.
    Secure Hash Standard: FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (April 1995)Google Scholar
  13. 13.
    Wu, S., Chen, K.: An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. Journal of Medical Systems (2011), doi:10.1007/s10916-011-9700-7Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Vanga Odelu
    • 1
  • Ashok Kumar Das
    • 2
  • Adrijit Goswami
    • 3
  1. 1.Department of MathematicsRajiv Gandhi University of Knowledge TechnologiesHyderabadIndia
  2. 2.Center for Security, Theory and Algorithmic ResearchInternational Institute of Information TechnologyHyderabadIndia
  3. 3.Department of MathematicsIndian Institute of TechnologyKharagpurIndia

Personalised recommendations