Open Access Open Access  Restricted Access Subscription or Fee Access

Time-bound Key Management Scheme for Secure Broadcasting Using ECC

S. Christobel Diana, P. Golda Jeyasheeli

Abstract


In this paper, the data to be securely broadcast, for example, electronic newspapers can be organized as a hierarchical tree and encrypted using algorithms according to predefined time periods and user privileges. An efficient key management scheme must achieve hierarchical and time-bound access. The hierarchical property is defined as that the users in the higher class can retrieve the data content that a lower class is authorized to access, but not vice versa. The time-bound property is defined as that the users can access data only in assigned time periods. Elliptic curve cryptography is deployed in this scheme. Intractability of Elliptic Curve Discrete Logarithm Problem (ECDLP) is used to achieve the hierarchical property. This scheme provides security against the collusion attack and reduces space and time complexity. In addition to security and efficiency, flexibility is also achieved in this scheme, thereby providing an efficient key management scheme for secure broadcasting.  

 


Keywords


Cryptography, Elliptic Curves, Key Management, Secure broadcasting, Time-Bound Key, Hierarchical Scheme.

Full Text:

PDF

References


E.Bertino, N. Shang and S. Wagstaff, “An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting”, IEEE Transactions on Dependable and secure computing, Vol. 5, No. 2, pp.65-70, April-June 2008.

W.G Tzeng, “A Time-Bound Cryptographic Key Assignment scheme for Access control in a hierarchy” , IEEE Transactions on Knowledge and Data Engineering, vol. 14,No.1 , pp. 182-188,Jan-Feb 2002.

H.Y Chien, “Efficient Time-Bound Hierarchical Key Assignment Scheme”, IEEE Transactions on Knowledge and Data Engineering, Vol.16, No.10, pp.1301-1304, Oct. 2004.

X. Yi, “Security of Chien’s Efficient Time-Bound Hierarchical Key Assignment Scheme,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 9, pp. 1298 1299, Sept. 2005.

X. Yi and Y. Ye, “Security of Tzeng’s Time-Bound Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 1054-1055, July/Aug. 2003.

Hung-Min Sun, “ On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no.2 ,pp 159-160,April-June 2009.

A.Jurisic and A.J. Menezes, “Elliptic Curves and Cryptography”, Dr. Dobb’s J., pp. 23-36, Apr. 1997.

www.bouncycastle.org


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.