skip to main content
10.1145/3340037.3340065acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmhiConference Proceedingsconference-collections
research-article

An Efficient Date-constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine System

Published: 17 May 2019 Publication History

Abstract

A hierarchical key management scheme for mobile agents in e-medicine system enables users, such as patients, doctors, nurses and health visitors, to conveniently and securely access a remote hierarchical medical database system via public networks. Efficient hierarchical key management schemes do not require heavy computations even if the hierarchical structure has too many levels and participants. Chen et al. recently developed a hierarchical key management scheme with date-constraint for mobile agents. The key management scheme of Chen et al. is based the Elliptic Curve Cryptosystem and allows each secret key to be partnered with a validity period by using one-way hash chains. However, the scheme of Chen et al. fails to execute correctly, violates authenticated key security, and requires hundreds of hash functional operations. This investigation discusses these limitations, and proposes an efficient date-constraint hierarchical key management scheme for mobile agents in e-medicine system, which provides a fast key validation and expiration check phase to rapidly check whether the secret keys are valid and time-expired or not. The proposed key management scheme not only provides more security properties and rapidly checks the validation of secret keys, but also reduces the computational cost.

References

[1]
Akl, S.G., Taylor, P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM T Comput Syst 1983; 1(3): 239--248.
[2]
Chen, T.L., Chung, Y.F., Lin F.Y.S. An efficient date-constraint hierarchical key management scheme for mobile agents. Expert Syst Appl 2010; 37: 7721--7728.
[3]
Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S. Access control in user hierarchy based on elliptic curve cryptosystem. Inform Science 2008; 178(1): 230--243.
[4]
Johnson, D., Menezes, A., Vanstone, S. The elliptic curve digital signature algorithm (ECDSA). Inform Sc 2001; 1: 36--63.
[5]
Koblitz, N. Elliptic curve cryptosystems. MATH COMPUT 1987; 48(177): 203--209.
[6]
Miller, V.S. Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques 1985; Vol. 218, pp. 417--426.
[7]
Stallings, W. Cryptography and Network Security: Principles and Practice. 5th ed. Upper Saddle River, NJ, USA: Prentice Hall, 2011.
[8]
Volker, R., Mehrdad, J.S.(1998). Access control and key management for mobile agents. Comp Graph 1998; 22(4): 457--461.

Index Terms

  1. An Efficient Date-constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine System

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICMHI '19: Proceedings of the 3rd International Conference on Medical and Health Informatics
    May 2019
    207 pages
    ISBN:9781450371995
    DOI:10.1145/3340037
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Electronic Science and Technology of China: University of Electronic Science and Technology of China

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Access control
    2. Date-constraint
    3. E-medicine system
    4. Elliptic curve cryptosystem
    5. Key management
    6. Mobile agent

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Tzu Chi University

    Conference

    ICMHI 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 46
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media