A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit Jyh-haw Yeh Dept. of Computer Science Boise State University.

Slides:



Advertisements
Similar presentations
Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
Advertisements

Public Key Infrastructure and Applications
RSA.
Public Key Cryptosystem
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
By Jyh-haw yeh Department of Computer Science Boise State University.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Asymmetric-Key Cryptography
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Broadcast Encryption and Traitor Tracing Jin Kim.
Scott CH Huang COM5336 Cryptography Lecture 14 XTR Cryptosystem Scott CH Huang COM 5336 Cryptography Lecture 10.
An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription.
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
ASYMMETRIC CIPHERS.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Introduction to Modular Arithmetic and Public Key Cryptography.
An Efficient Identity-based Cryptosystem for
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Aggregation in Sensor Networks
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Wai Kit Wong, Ben Kao, David W. Cheung, Rongbin Li, Siu Ming Yiu.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms Sarani Bhattacharya and Debdeep Mukhopadhyay Dept. of Computer Science and.
Step 1 Log in with your username and password Adding direct links to online archives from your VLE.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st Yuuki Horita.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Elliptic Curve Cryptography
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
A novel key management scheme for dynamic access control in a user hierarchy Authors: Tzer-Shyong Chen ( 陳澤雄 ) and Jen-Yan Huang Source: Applied Mathematics.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Homework #2 J. H. Wang Oct. 31, 2012.
New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Efficient Time-Bound Hierarchical Key Assignment Scheme
Qiong Zhang, Yuke Wang Jason P, Jue 2008
Efficient CRT-Based RSA Cryptosystems
Presentation transcript:

A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit Jyh-haw Yeh Dept. of Computer Science Boise State University

Problem history The problem was first proposed by Tzeng (2002). Alternative schemes: Chien’s (2004), Huang and Chang’s (2004), Wang and Laih’s (2006). Tzeng’s, Chien’s, Huang and Chang’s schemes were broken. Wang and Laih’s scheme is secure but cannot assign keys on the fly.

Problem A system is divided into n classes. These n classes form a hierarchical structure. Time is divided into periods. Each user is assigned to a class C_i with a set of time periods T. The system give the user a user key K_{I,T}.

Problem (cont…) Each class C_j in each time period t encrypts its own data by a key K_{j,t}. A user, in C_i with time periods T, is able to access data in C_j encrypted at time t iff C_i is higher than C_j and t is in T. The problem becomes assigning keys so that K_{i,T}  K_{j,t} iff C_i is higher than C_j and t is in T.

Problem (cont…)

Application A publisher publishes journals periodically. Different packages of journals for subscription. Users subscribe packages for different time periods. Only subscribed users can access the journals published in the time periods the users subscribed to.

Application (cont…) The journals can be just posted online, but encrypted. Each journal published in different time period is encrypted by a different key. Each user has one user key. The user key can decrypt only the journals the user are entitled to access.

An Example

Key Assignment Based on RSA algorithm. 4 processes:  Initialization: compute parameters.  Encryption key Generation: assign an encryption key for each class at each time period.  User key generation:  Key derivation: use a user key and some public parameters to derive an encryption.

Key assignment (cont…)

Key Assignment (cont…)

Comparison SchemesTzengChienW & LThe Scheme SecurityBroken # of public parameters O(m)O(m²)O(m z)O(m+z) Assign non- consecutive time periods No Yes System’s lifeLimited Unlimited, but with extra effort Unlimited Hardware support NoYesNo

Future Works Develop dynamic management component of the scheme: add (delete) new classes, add (delete) users, add (delete) time periods to (from) users. Comprehensive analysis of the efficiency of the scheme: storage, computation… Formal proofs of the security.