On the security of an efficient time-bound hierarchical key management scheme

Sun Hung-Min,Wang King-Hang,Chen Chien-Ming
DOI: https://doi.org/10.1109/TDSC.2009.15
2009-01-01
IEEE Transactions on Dependable and Secure Computing
Abstract:Recently, Bertino et al. proposed a new time-bound key management scheme for broadcasting. The security of their scheme is planted on the hardness breaking of elliptic curve discrete log problem, HMAC, and tamper-resistance devices. They claimed that as long as the three assumptions hold, their scheme is secure. By means of secure, users cannot access resources that they are not granted, even if users collude. In this paper, we demonstrate that this scheme is insecure against the collusion attack. We also provide some possible amendments to this scheme. © 2006 IEEE.
What problem does this paper attempt to address?