A Low-Cost Key Derivation Scheme for Hierarchy-Based Access

In current content delivery service, contents are usually encrypted for access control mechanism, so several key distribution schemes have been proposed. In this paper, we propose a new key derivation scheme for hierarchy-based access control. We assume that content consumers are listed in digraph structure, and all nodes are assigned seeds(pre-keys) for decryption keys. All decryption keys are generated from initial keys assigned in root nodes, and a decryption key is derived from seeds of an ancestor node only using the one-way hash function. The proposed scheme includes conventional hierarchy-based key derivation schemes and can be implemented with low cost in computation for decryption keys because we do not need exponential calculations.

[1]  Jianhua Li,et al.  A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[2]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[3]  Ravi S. Sandhu,et al.  The Reflected Tree Hierarchy for Protection and Sharing , 1989, Inf. Process. Lett..

[4]  Byrav Ramamurthy,et al.  Hierarchy-based access control in distributed environments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[5]  Tomoyuki Asano A Revocation Scheme with Minimal Storage at Receivers , 2002, ASIACRYPT.

[6]  Marc Joye,et al.  One-Way Cross-Trees and Their Applications , 2002, Public Key Cryptography.

[7]  Bob Briscoe,et al.  Nark: receiver-based multicast non-repudiation and key management , 1999, EC '99.

[8]  Robert H. Deng,et al.  Progressive protection of JPEG2000 codestreams , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[9]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[10]  Indrajit Ray,et al.  A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.

[11]  Vipul Goyal,et al.  How To Re-initialize a Hash Chain , 2004, IACR Cryptol. ePrint Arch..

[12]  Chu-Hsing Lin,et al.  Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..

[13]  Chu-Hsing Lin,et al.  Hierarchical key assignment without public-key cryptography , 2001, Comput. Secur..

[14]  Toru Fujiwara,et al.  A Time-Limited Key Management Scheme Based on a One-Way Permutation Tree , 2005 .