Security Analysis of A Time-bound Hierarchical Key Assignment Scheme

被引:2
|
作者
Pan, Jeng-Shyang [1 ]
Wu, Tsu-Yang [2 ,3 ]
Chen, Chien-Ming [2 ,3 ]
Wang, Eric Ke [2 ,3 ]
机构
[1] Fujian Univ Technol, Coll Informat Sci & Engn, Fuzhou 350118, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[3] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
关键词
hierarchical key assignment; time-bound; bilinear pairing; security analysis; ACCESS-CONTROL; MANAGEMENT;
D O I
10.1109/IIH-MSP.2015.66
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Wu et al. proposed a time-bound hierarchical key assignment (TBHKA) scheme which supports discrete time periods. In their scheme, it fused RSA and pairing-based cryptosystems and is provably secure. In this paper, we demonstrate a weakness of Wu et al.'s TBHKA scheme, ie. a collusion attack. Any two users can collude to compute an encryption key to access some class in an un-scribing time period.
引用
收藏
页码:203 / 206
页数:4
相关论文
共 50 条
  • [41] Cryptographic key assignment scheme for hierarchical access control
    Wu, TC
    Chang, CC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (01): : 25 - 28
  • [42] Efficient date-constraint hierarchical key assignment scheme
    Lee, WB
    Li, JH
    Dow, CR
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 51 - 57
  • [43] Automatic time-bound analysis for a higher-order language
    Gómez, G
    Liu, YA
    ACM SIGPLAN NOTICES, 2002, 37 (03) : 75 - 86
  • [44] A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency
    Celikbilek, Ibrahim
    Celiktas, Baris
    Ozdemir, Enver
    IEEE ACCESS, 2024, 12 : 70568 - 70580
  • [45] A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
    Hao, Z.
    Zhong, S.
    Yu, N.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 227 - 235
  • [46] Planning and executing time-bound projects
    Miranda, E
    COMPUTER, 2002, 35 (03) : 73 - +
  • [47] THE TIME-BOUND AND THE TIMELESS IN RABBINIC THOUGHT
    BOKSER, BZ
    JUDAISM, 1961, 10 (03) : 265 - 270
  • [48] ARE SOCIAL BACKGROUND MODELS TIME-BOUND
    ULMER, SS
    AMERICAN POLITICAL SCIENCE REVIEW, 1986, 80 (03) : 957 - 967
  • [49] Hierarchical access control with time-bound constraints based upon Chinese remainder theorem
    Department of Applied Mathematics, National Chiayi University, No.300 Syuefu Rd., Chiayi City 60004, Taiwan
    WSEAS Trans. Inf. Sci. Appl., 2007, 6 (1251-1256): : 1251 - 1256
  • [50] An Efficient Time-Bound Collision Prevention Scheme for RFID Re-Entering Tags
    Li, Jung-Shian
    Huo, Yu-Min
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (06) : 1054 - 1064