NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
DOT NET PROJECTS LIST--2013
DOT NET 2013 IEEE PAPERS
Security of
Bertino-Shang-Wagstaff
Time-Bound Hierarchical
Key Management
Scheme for Secure
Broadcasting
ABSTRACT
Recently, Bertino, Shang and Wagstaff proposed a
time-bound hierarchical key management scheme for secure broadcasting. Their
scheme is built on elliptic curve cryptography and implemented with
tamper-resistant devices. In this paper, we present two collusion attacks on
Bertino-Shang-Wagstaff scheme. The first attack does not need to compromise any
decryption device, while the second attack requires to compromise single
decryption device only. Both attacks are feasible and effective
EXISTING
SYSTEM
Tzeng proposed a time-bound cryptographic key assignment
scheme for access control in a partial-order hierarchy. Tzeng’s scheme requires
the computation of Lucas functions and module exponentiations to derive a
secret class key and thus, is computationally inefficient. Moreover, Yi and
Ye has shown that three users can
conspire to access some secret class keys that they should not know according
to Tzeng’s scheme . In 2004, Chien
improved the efficiency and security of Tzeng’s scheme, and proposed
another time-bound hierarchical key assignment scheme. Chien’s scheme is built
on hash function and implemented with tamper-resistant devices, and therefore,
greatly reduces the computation load and implementation cost. However, Yi has shown that three users can still conspire
to decrypt some data with one of their decryption devices, which should not
have derived the decryption key according to Chien’s scheme.
PROPOSED
SYSTEM
Inspired by Chien’s idea, Bertino, Shang and Wagstaff
[1]proposed a new time-bound hierarchical key management schemefor secure
broadcasting recently. Their scheme is built on ellipticcurve cryptography and
also implemented with tamper-resistant devices. In this paper, we present two
collusion attacks on Bertino-Shang-Wagstaff scheme. In both attacks, two users
collude todecrypt some broadcast data that they have not subscribed to,using
one of their decryption devices.
SYSTEM SPECIFICATION
HARDWARE CONFIGURATION
PROCESSOR : PENTIUM IV
RAM : 512 MD SD RAM
HARD DISK : 50 GB
SOFTWARE CONFIGURATION
OPERATING SYSTEM : Windows XP (Version
2002)
ENVIRONMENT : Visual Studio .NET 2008
.NET FRAMEWORK : Version 3.5
FRONT END : C#.Net
LANGUAGE : C#
BACK END : SQL SERVER 2005
No comments:
Post a Comment