An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem

被引:25
|
作者
Jeng, Fuh-Gwo
Wang, Chung-Ming
机构
[1] Natl Chiayi Univ, Dept Appl Math, Chiayi 60004, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
elliptic curve cryptosystem; key management scheme; hierarchical access control;
D O I
10.1016/j.jss.2006.01.018
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The elliptic curve cryptosystem is considered to be the strongest public-key cryptosystem known today and is preferred over the RSA cryptosystem because the key length for secure RSA has increased over recent years, and this has put a heavier processing load on its applications. An efficient key management and derivation scheme based on the elliptic curve cryptosystem is proposed in this paper to solve the hierarchical access control problem. Each class in the hierarchy is allowed to select its own secret key. The problem of efficiently adding or deleting classes can be solved without the necessity of regenerating keys for all the users in the hierarchy, as was the case in previous schemes. The scheme is shown much more efficiently and flexibly than the schemes proposed previously. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:1161 / 1167
页数:7
相关论文
共 50 条
  • [1] An improved key-management scheme for hierarchical access control
    Chao, Wan-Yu
    Tsai, Cheng-Yi
    Hwang, Min-Shiang
    [J]. International Journal of Network Security, 2017, 19 (04) : 639 - 643
  • [2] Efficient utilization of elliptic curve cryptosystem for hierarchical access control
    Nikooghadam, Morteza
    Zakerolhosseini, Ali
    Moghaddam, Mohsen Ebrahimi
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1917 - 1929
  • [3] An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
    Wu, Shuhua
    Chen, Kefei
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (04) : 2325 - 2337
  • [4] An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
    Shuhua Wu
    Kefei Chen
    [J]. Journal of Medical Systems, 2012, 36 : 2325 - 2337
  • [5] Research on Key Management Scheme for WSN based on Elliptic Curve Cryptosystem
    Jiang Jian-wei
    Liu Jian-hui
    [J]. NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 536 - +
  • [6] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [7] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [8] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem
    Zhang, Wenjuan
    Yu, Meisheng
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
  • [9] A KEY-MANAGEMENT SCHEME BASED ON CONTROL VECTORS
    MATYAS, SM
    LE, AV
    ABRAHAM, DG
    [J]. IBM SYSTEMS JOURNAL, 1991, 30 (02) : 175 - 191
  • [10] An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)