Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security, Vol22, No 5, pp. 453-456,2003 Author: Chien-Lung Hsu ,Tzong-Sun Wu Speaker: Yi-Fang Cheng Date: 2004 11/8
Outline Introduction Wu-Chang scheme Shen-Chen scheme Cryptanalyses Improvement Conclusion
Introduction C1 C2 C3 C5 C4 C6 (u11,u12,u13,u14) (u21,u22)
Wu-Chang scheme (1/2) Key generation stage : C1 C2 C3 C5 C4 C6
Wu-Chang scheme (2/2) Key derivation stage : C1 C2 C3 C5 C4 C6 u31 u52
Shen-Chen scheme (1/2) Key generation stage : C1 C2 C3 C5 C4 C6
Shen-Chen scheme (2/2) Key derivation stage : C1 C2 C3 C5 C4 C6
Cryptanalysis of Wu-Chang scheme C3 can get the private key of C4 C1 C2 C3 C5 C4 C6
Cryptanalysis of Shen-Chen scheme C3 can get the private key of C4 C1 C2 C3 C5 C4 C6
Improvement of Wu-Chang scheme Modify the polynomial function by using a one-way hash function
Improvement of Shen-Chen scheme Modify the polynomial function by using a one-way hash function
Conclusion To eliminate the security leaks by using a one way hash function