Security Analysis of A Time-bound Hierarchical Key Assignment Scheme

被引:2
|
作者
Pan, Jeng-Shyang [1 ]
Wu, Tsu-Yang [2 ,3 ]
Chen, Chien-Ming [2 ,3 ]
Wang, Eric Ke [2 ,3 ]
机构
[1] Fujian Univ Technol, Coll Informat Sci & Engn, Fuzhou 350118, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[3] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
关键词
hierarchical key assignment; time-bound; bilinear pairing; security analysis; ACCESS-CONTROL; MANAGEMENT;
D O I
10.1109/IIH-MSP.2015.66
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Wu et al. proposed a time-bound hierarchical key assignment (TBHKA) scheme which supports discrete time periods. In their scheme, it fused RSA and pairing-based cryptosystems and is provably secure. In this paper, we demonstrate a weakness of Wu et al.'s TBHKA scheme, ie. a collusion attack. Any two users can collude to compute an encryption key to access some class in an un-scribing time period.
引用
收藏
页码:203 / 206
页数:4
相关论文
共 50 条
  • [1] Enforcing the security of a time-bound hierarchical key assignment scheme
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    INFORMATION SCIENCES, 2006, 176 (12) : 1684 - 1694
  • [2] An Improved Time-Bound Hierarchical Key Assignment Scheme
    Xu, Qingyu
    He, Mingxing
    Harn, Lein
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1489 - +
  • [3] Security of Chien's efficient time-bound hierarchical key assignment scheme
    Yi, X
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (09) : 1298 - 1299
  • [4] Efficient time-bound hierarchical key assignment scheme
    Chien, HY
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10)
  • [5] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +
  • [6] An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 3 - 9
  • [7] On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
    Sun, Hung-Min
    Wang, King-Hang
    Chen, Chien-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (02) : 159 - 160
  • [8] A Novel Time-bound Hierarchical Key Assignment Scheme for Mobile Agent
    Liu, Chia-Hui
    Chung, Yu-Fang
    Jhuo, Jin-De
    Chen, Tzer-Shyong
    Wang, Sheng-De
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 258 - +
  • [9] Merging: An efficient solution for a time-bound hierarchical key assignment scheme
    Wang, SY
    Laih, CS
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (01) : 91 - 100
  • [10] Time-Bound Hierarchical Key Assignment: An Overview
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Rao, Feng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1044 - 1052