International Conference on Genetic and Evolutionary Computing

GEC 2015: Genetic and Evolutionary Computing pp 3-9 | Cite as

An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme

  • Jeng-Shyang Pan
  • Tsu-Yang Wu
  • Chien-Ming Chen
  • Eric Ke Wang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 388)

Abstract

Time-bound hierarchical key assignment (TBHKA) scheme is a cryptographic method. It can assign encryption keys depending on time to a set of security classes in a partially ordered hierarchy. Only the authorized user can compute the encryption key to access the subscribing class (including lower down class) according to the hierarchy. In 2005, Yeh firstly proposed a RSA-based TBHKA scheme supporting discrete time period. However, it had been proved insecure against user colluding attacks. Up to now, there are less study for TBHKA scheme supporting discrete time period. In this paper, we propose a secure and efficient TBHKA scheme. Our scheme is based on pairing-based public key cryptosystem and supports discrete time period. The security analysis is demonstrated that our scheme is secure against outside adversary and malicious user. Finally, we make comparisons between recently proposed two TBHKA schemes and our scheme. It will show the advantages of our scheme.

Keywords

Hierarchical key assignment Time-bound Bilinear pairing Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (TOCS) 1(3), 239–248 (1983)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of the 13th ACM Conference on Computer and Communications security, pp. 288–297. ACM (2006)Google Scholar
  3. 3.
    Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. Journal of Cryptology 25(2), 243–270 (2012)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. In: Proceedings of the ACM Conference on Computer and Communications Security (2005)Google Scholar
  5. 5.
    Chen, C.M., Wu, T.Y., He, B.Z., Sun, H.M.: An efficient time-bound hierarchical key management scheme without tamper-resistant devices. In: 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN), pp. 285–288. IEEE (2012)Google Scholar
  6. 6.
    Chen, Y.-R., Chu, C.-K., Tzeng, W.-G., Zhou, J.: Cloudhka: a cryptographic approach for hierarchical access control in cloud computing. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 37–52. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  7. 7.
    Cheng, Z.: Implementing pairing-based cryptosystems in usb tokens. IACR Cryptology ePrint Achieve 2014(71) (2014)Google Scholar
  8. 8.
    Chien, H.Y.: Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 16(10), 1301–1304 (2004)MathSciNetCrossRefGoogle Scholar
  9. 9.
    He, B.Z., Chen, C.M., Wu, T.Y., Sun, H.M.: An efficient solution for hierarchical access control problem in cloud environment. Mathematical Problems in Engineering 2014, Article ID 569397, p. 8 (2014)Google Scholar
  10. 10.
    Jiang, T., Zheng, S., Liu, B.: Key distribution based on hierarchical access control for conditional access system in dtv broadcast. IEEE Transactions on Consumer Electronics 50(1), 225–230 (2004)CrossRefGoogle Scholar
  11. 11.
    Tseng, Y.M., Yu, C.H., Wu, T.Y.: Towards scalable key management for secure multicast communication. Information Technology And Control 41(2), 173–182 (2012)CrossRefGoogle Scholar
  12. 12.
    Tzeng, W.G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 14(1), 182–188 (2002)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Wang, S.Y., Laih, C.S.: Merging: an efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing 3(1), 91–100 (2006)CrossRefGoogle Scholar
  14. 14.
    Wu, T.Y., Tseng, Y.M.: An id-based mutual authentication and key exchange protocol for low-power mobile devices. The Computer Journal 53(7), 1062–1070 (2010)CrossRefGoogle Scholar
  15. 15.
    Wu, T.-Y., Zhou, C., Wang, E.K., Pan, J.-S., Chen, C.-M.: Towards time-bound hierarchical key management in cloud computing. In: Pan, J.-S., Snasel, V., Corchado, E.S., Abraham, A., Wang, S.-L. (eds.) Intelligent Data Analysis and Its Applications, Volume I. AISC, vol. 297, pp. 31–38. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  16. 16.
    Yeh, J.H.: A secure time-bound hierarchical key assignment scheme based on rsa public key cryptosystem. Information Processing Letters 105(4), 117–120 (2008)MathSciNetCrossRefMATHGoogle Scholar
  17. 17.
    Yi, X.: Security of chien’s efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 17(9), 1298–1299 (2005)CrossRefGoogle Scholar
  18. 18.
    Yi, X., Ye, Y.: Security of tzeng’s time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 15(4), 1054–1055 (2003)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Jeng-Shyang Pan
    • 1
  • Tsu-Yang Wu
    • 2
    • 3
  • Chien-Ming Chen
    • 2
    • 3
  • Eric Ke Wang
    • 2
    • 3
  1. 1.College of Information Science and EngineeringFujian University of TechnologyFuzhouChina
  2. 2.Shenzhen Graduate SchoolHarbin Institute of TechnologyShenzhenChina
  3. 3.Shenzhen Key Laboratory of Internet Information CollaborationShenzhenChina

Personalised recommendations