The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - April-June (2008 vol.5)
pp: 65-70
ABSTRACT
In electronic subscription and pay TV systems, data can be organized and encrypted using symmetric key algorithms according to predefined time periods and user privileges, then broadcast to users. This requires an efficient way to manage the encryption keys. In this scenario, time-bound key management schemes for a hierarchy were proposed by Tzeng and Chien in 2002 and 2005, respectively. Both schemes are insecure against collusion attacks. In this paper, we propose a new key assignment scheme for access control which is both efficient and secure. Elliptic curve cryptography is deployed in this scheme. We also provide analysis of the scheme with respect to security and efficiency issues.
INDEX TERMS
Access controls, Cryptographic controls, Database Administration
CITATION
Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr., "An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting", IEEE Transactions on Dependable and Secure Computing, vol.5, no. 2, pp. 65-70, April-June 2008, doi:10.1109/TDSC.2007.70241
REFERENCES
[1] Advanced Encryption Standard, http://csrc.nist.gov/CryptoToolkitaes/, 2007.
[2] R. Anderson and M. Kuhn, “Low-Cost Attacks on Tamper-Resistant Devices,” Proc. Fifth Int'l Workshop Security Protocols (IWSP '97), pp. 125-136, 1997.
[3] E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, “An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning,” ACM Trans. Database Systems, vol. 23, no. 3, pp. 231-285, Sept. 1998.
[4] E. Bertino, B. Carminati, and E. Ferrari, “A Temporal Key Management Scheme for Secure Broadcasting of XML Documents,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS'02), pp. 31-40, Nov. 2002.
[5] H.-Y. Chien, “Efficient Time-Bound Hierarchical Key Assignment Scheme,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 10, pp.1302-1304, Oct. 2004.
[6] FIPS Publication 198, The Keyed-Hash Message Authentication Code (HMAC), http://csrc.nist.gov/publications/fips/fips198 fips-198a.pdf, 2008.
[7] A. Jurisic and A.J. Menezes, “Elliptic Curves and Cryptography,” Dr. Dobb's J., pp. 23-36, Apr. 1997.
[8] http://www.raaktechnologies.com/download raak-c7-standard. pdf, Web article, 2007.
[9] E.R. Sparks, “A Security Assessment of Trusted Platform Modules,” computer science technical report, http://www.ists.dartmouth.edu/library341.pdf , 2007.
[10] Trusted Platform Module, https://www.trustedcomputinggroup. org/groups tpm/, 2007.
[11] W.G. Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Trans. Knowledge and Data Eng., Proc. Sixth ACM Symp. Access Control Models andTechnologies (SACMAT '01), vol. 14, no. 1, pp. 182-188, Jan./Feb. 2002.
[12] X. Yi, “Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 9, pp. 1298-1299, Sept. 2005.
[13] X. Yi and Y. Ye, “Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 1054-1055, July/Aug. 2003.
[14] L.C. Washington, Elliptic Curves, Number Theory and Cryptography. Chapman & Hall/CRC, 2003.
40 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool