Security Analysis of A Time-bound Hierarchical Key Assignment Scheme

被引:2
|
作者
Pan, Jeng-Shyang [1 ]
Wu, Tsu-Yang [2 ,3 ]
Chen, Chien-Ming [2 ,3 ]
Wang, Eric Ke [2 ,3 ]
机构
[1] Fujian Univ Technol, Coll Informat Sci & Engn, Fuzhou 350118, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[3] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
来源
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP) | 2015年
关键词
hierarchical key assignment; time-bound; bilinear pairing; security analysis; ACCESS-CONTROL; MANAGEMENT;
D O I
10.1109/IIH-MSP.2015.66
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Wu et al. proposed a time-bound hierarchical key assignment (TBHKA) scheme which supports discrete time periods. In their scheme, it fused RSA and pairing-based cryptosystems and is provably secure. In this paper, we demonstrate a weakness of Wu et al.'s TBHKA scheme, ie. a collusion attack. Any two users can collude to compute an encryption key to access some class in an un-scribing time period.
引用
收藏
页码:203 / 206
页数:4
相关论文
共 50 条
  • [21] A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security
    Chien, Hung-Yu
    Chen, Ying-Lun
    Lo, Chien-Feng
    Huang, Yuh-Ming
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2010, 6104 : 407 - 417
  • [22] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Victor R. L. Shen
    Wei-Chieh Huang
    Wireless Personal Communications, 2015, 85 : 1741 - 1764
  • [23] An efficient time-bound hierarchical key management scheme for secure broadcasting
    Bertino, Elisa
    Shang, Ning
    Wagstaff, Samuel S., Jr.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) : 65 - 70
  • [24] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Shen, Victor R. L.
    Huang, Wei-Chieh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1741 - 1764
  • [25] Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control
    Wu, Tsu-Yang
    Zhou, Chengxiang
    Chen, Chien-Ming
    Wang, Eric Ke
    Pan, Jeng-Shyang
    MULTIDISCIPLINARY SOCIAL NETWORKS RESEARCH, MISNC 2014, 2014, 473 : 437 - 444
  • [26] Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) : 303 - 304
  • [27] Towards time-bound hierarchical key assignment for secure data access control
    Wu, Tsu-Yang (wutsuyang@gmail.com), 1600, Springer Verlag (473):
  • [28] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 133 - 138
  • [29] New constructions for provably-secure time-bound hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    THEORETICAL COMPUTER SCIENCE, 2008, 407 (1-3) : 213 - 230
  • [30] A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTS
    Huang, Jen-Yan
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Liao, I-En
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2159 - 2170