Abstract

Several key management schemes for dynamic access control in a user hierarchy are proposed in the literature. Most schemes are based on elliptic curve cryptography (ECC) and polynomial interpolation. Due to time-consuming operations involved in the elliptic curve scalar multiplication and construction of interpolating polynomials, most existing schemes require high storage and computational complexity. Moreover, most of the proposed schemes are vulnerable to different attacks including the man-in-the-middle attacks. In this paper, we devise a novel key management scheme for hierarchical access control based on linear polynomials only. We show that our scheme is secure against all possible different attacks including the man-in-the-middle attack, which are required for designing an access control scheme, through both the informal and formal security analysis. The computational cost and the storage space are significantly reduced in our scheme while compared to the recently proposed related schemes. Thus, o...

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.