The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2012 vol. 9)
ISSN: 1545-5971
pp: 303-304
Xun Yi , Victoria University, Melbourne
Recently, Bertino, Shang and Wagstaff proposed a time-bound hierarchical key management scheme for secure broadcasting. Their scheme is built on elliptic curve cryptography and implemented with tamper-resistant devices. In this paper, we present two collusion attacks on Bertino-Shang-Wagstaff scheme. The first attack does not need to compromise any decryption device, while the second attack requires to compromise single decryption device only. Both attacks are feasible and effective.
Secure broadcasting, time-bound hierarchical key management, elliptic curve cryptography.

X. Yi, "Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting," in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. , pp. 303-304, 2010.
82 ms
(Ver 3.3 (11022016))