By Topic

Novel method for implementation of certain key management schemes to minimize secret storage

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
M. J. Mihaljevic ; Mathematical Inst., Serbian Acad. of Sci. & Arts, Serbia, Yugoslavia ; H. Imai

The problem of minimizing the amount of secret information (secret bits) required for certain key management schemes related to data access control techniques is addressed. Particularly note that the importance of the secret storage minimization originates from the fact that this storage should be read-proof and tamper-proof one. This paper points out to a novel approach for minimization of the secret storage dimension and compare this approach with a straightforward one based on establishing a virtual secret storage employing data encryption. The novel approach yields: (i) provable security; (ii) it is not based on storing the encrypted data into a public storage, and (iii) it requires lower processing complexity. The proposed approach yields the secret storage minimization via exchange of a secret storage to a public one based on the efficient one-way mapping of the secret bits yielding significant additional flexibility and reduction of the secret storage overhead at the user's side as an appropriate trade-off with the required public storage and processing complexity. The overheads of the proposed technique are compared with the related previously reported ones, and advantages of the novel approach are pointed out.

Published in:

Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005

Date of Conference:

3-6 Jan. 2005