Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem

  • Authors:
  • Ashok Kumar Das;Nayan Ranjan Paul;Laxminath Tripathy

  • Affiliations:
  • Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India;Department of Computer Science, KMBB College of Engineering and Technology, Khurda 752 056, India;Department of Information Technology, Eastern Academy of Science and Technology, Bhubaneswar 754 001, India

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2012

Quantified Score

Hi-index 0.07

Visualization

Abstract

In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2008, Chung et al. proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem [Information Sciences 178 (1) (2008) 230-243]. Their scheme provides solution of key management efficiently for dynamic access problems. However, in this paper, we propose an attack on Chung et al.'s scheme to show that Chung et al.'s scheme is insecure against the exterior root finding attack. We show that under this attack, an attacker (adversary) who is not a user in any security class in a user hierarchy attempts to derive the secret key of a security class by using the root finding algorithm. In order to remedy this attack, we further propose a simple improvement on Chung et al.'s scheme. Overall, the main theme of this paper is very simple: a security flaw is presented on Chung et al.'s scheme and then a fix is provided in order to remedy the security flaw found in Chung et al.'s scheme.