Download Now Free registration required
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic access problems. However, in this paper, the authors propose an attack on Jeng-Wang scheme to show that Jeng-Wang scheme is insecure against their proposed attack. They show that in their proposed attack, an attacker (adversary) who is not a user in any security class in a user hierarchy attempts to derive the secret key of a security class.
- Format: PDF
- Size: 318.41 KB