On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with Biometrics

Femila, M. Daris and Irudhayaraj, A. Anthony (2010) On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with Biometrics. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA STORAGE AND DATA ENGINEERING (DSDE 2010). pp. 283-286.

Full text not available from this repository.

Abstract

Recently, Bertino proposed a new time-bound key management scheme for broadcasting. The security of their scheme is planted on the hardness breaking of elliptic curve discrete log problem, HMAC, and tamper-resistance devices. They claimed that as long as the three assumptions hold, their scheme is secure. By means of secure, users cannot access resources that they are not granted, even if users collude. In this paper, we demonstrate that this scheme is insecure against the collusion attack. We also provide some possible amendments to this scheme.

Item Type: Article
Uncontrolled Keywords: Time-bound key management, cryptanalysis
Subjects: Computer Science > Computer Science
Computer Science > Information Systems
Divisions: Engineering and Technology > Aarupadai Veedu Institute of Technology, Chennai, India > Computer Science and Engineering
Depositing User: Unnamed user with email techsupport@mosys.org
Last Modified: 06 Feb 2026 06:59
URI: https://ir.vmrfdu.edu.in/id/eprint/6422

Actions (login required)

View Item
View Item