Secure Transmission of Information Using Key Management by Elliptic-Curve Cryptography
Ruby Singh , Pramod Kumar Sagar , Kanika Garg
Abstract
The basic concept of providing the data to the user should be based on the key management such as in electronic subscription and pay channel systems. In the proposed system, we are forming the key assignment scheme for access control information for efficiency and security. We are keeping the master key as a secret that data should be organized and then it should be broadcast to the users providing them with some privileges and the data are to be stored in the Tamper-Resistant Devices. It should be managed in efficient way by using Elliptical curve cryptographic key algorithms. An ideal time-bound key management scheme should be able to perform the task in an efficient fashion and minimize the storage and communication of keys. Elliptic-Curve Cryptography (ECC) is deployed in this scheme to overcome large computational load, high implementation cost and to enhance security & efficiency.
[1]. M. Atallah, M. Blanton, and K. Frikken, “Incorporating Temporal Capabilities in Existing Key Management Schemes,” European Symposium on Research in Computer Security (ESORICS’07), Sep. 2007.
[2]. M. Atallah, M. Blanton, and K. Frikken, “Efficient Key Derivation for Access Hierarchies,” CERIAS Technical Report TR 2007-30, Purdue University, Jun. 2007.
[3].A.De Santis, A. Ferrara, and B. Masucci., “Cryptographic key assignment scheme for any access control policy”, Information Processing Letters (IPL), 2(4):19 205, November 2004.
[4]. W. Tzeng. “A time-bound cryptographic key assignment scheme for access control in a hierarchy”,EEE Transactions on Knowledge and Data Engineering (TKDE), 14(1):182–188, 2002.
Cites this article as
R. S. , P. K. S. , K. G. ,
"Secure Transmission of Information Using Key Management by Elliptic-Curve Cryptography", International Journal of Innovative Research in Engineering & Management (IJIREM), Vol-2, Issue-3, Page No-60-62, 2015. Available from:
Corresponding Author
Ruby Singh
Assistant Professor, Dept of IT, SRM University, NCR Campus Modinagar rubysinghit@gmail.com