Abstract
The mobile agent is functioning as an information exchanger with hosts. In order to reduce the communication time that the host sent to the members of a large system. This article proposes to use a function defined by Lagrange polynomial to compute decryption key. Each host will be given a decryption key to access the confidential document by inputting a secret key into an interpolation function which is generated from Lagrange interpolation. Since tasks are done by the mobile agent, the whole process will be performed within a short time period because there is no physical connection between the end devices. The information exchange occurs at the end hosts.
Introduction
This article tends to develop a security scheme with mobile agents and Lagrange interpolation method. With this scheme, the network delay would be significantly reduced. However, the mobile agents can develop their own protocols to interact with the hosts of other agents and roam across heterogeneous systems. Otherwise, it is able to work across various systems and solve the difficulty of integrating heterogeneous systems.
We have reviewed several published key management designs associated with interpolation polynomials. In addition, the security scheme could reduce the network delay and improve the computation process, ensuring the overall mechanism security. Moreover, this scheme would generate the computation processes’ time curve charts and show the mathematical derivations.
Previous work
From the previous work, Shen and Chen 1 proposed a scheme in 2002 to have each class obtain a public and a private key for access purposes. This scheme was developed based on discrete logarithm 2 and Newton’s polynomial interpolation. 3 However, the scheme is not good enough for security. In the following year, Hsu and Wu 4 pointed out the security flaws of Shen et al.’s scheme in which if there are two classes with the same immediate successor, any successor is able to access another which is not authorized to obtain the data. Das et al. 5 proposed a solution in 2005 to remedy the security defects of Shen et al.’s scheme. A lot of related works have been proposed to solve access control problems.6–8
Based on discrete logarithm and Newton’s interpolation method, Chang et al. 9 proposed a cryptographic key assignment scheme in 2004 to solve the access control problem in partially ordered user hierarchy. However, double encryption problem occurs in his scheme. The security level is the same as single encryption. For Das et al.’s scheme, it uses an encryption system to generate a secret key SKi for each security class. If SCj ≤ SCi, SCi can obtain its secret key and derive SCj’s secret key directly instead of obtaining a decryption key of an authorized file. According to Das et al.’s 5 scheme, SCi can use his own secret key SKi to derive the decryption key DKj. This approach is extremely insecure and may infringe upon personal privacy. In this article, for example, it derives a file’s decryption key DKj using the secret key SKi. The way Das et al. used was suspicious in personal privacy which was extremely insecure.
Based on interpolation polynomial, 10 Das et al. 5 and Chang et al. 9 offered key management schemes. Those schemes have to be improved in terms of effectiveness and security performance. In contrast, in this research a scheme that was more efficient is proposed since it needs only fewer modules. The essence of the scheme is that the key generation and derivation require much amount of time to complete.
Proposed scheme
The Lagrange interpolation method will be used to retain the decryption keys for confidential documents by mobile agents for the authorized hosts, which is applied to organizations with no definite hierarchical structure relationships among their departments of sectors. Not only is the Lagrange interpolation an encryption–decryption algorithm, but it also provides a mathematical framework to build a secure key management scheme as well. This mathematical feature is used to establish a set of equations for our proposed scheme. We further implement the ElGamal public key system to enhance security concerns. In our proposed scheme, the mobile agents obtain the encryption key DKt of a confidential document for an authorized host SCi by substituting the secret key SKi of the host SCi an interpolation function
Key generation phase
The mobile agent is designed to obtain and manage the decryption keys DKt for each confidential file. Besides, the mobile agent is used to check the authenticity of the class’s secret key SKi for checking the authenticity of the class’s secret key when required. The theme of our scheme is shown as follows:
Step 1. The mobile agent randomly selects a big prime number p = 2p′+1, where p′ is also a big prime number. Then, the chosen g is a root of Galois field GF(p) and makes g, p, and p′ public.
Step 2. The mobile agent selects different decryption keys DKt (t = 1, 2, …, m, with m being the number of decryption keys in the mobile agent) for each confidential document, where DKt and p – 1 are relatively prime.
Step 3. The mobile agent selects different secret keys SKi (i = 1, 2, …, n, with n being the number of visited hosts), where SKi and p – 1 are relatively prime and SKi is private.
Step 4. The interpolation function is established as follows
where
In the above formula,
Example
Suppose that a confidential document, the encryption key of which is DKt that is kept in a mobile agent, is to be transmitted to an assigned department (see Figure 1). A person with authorized access can substitute the secret key, SCi, into the interpolation function to obtain the corresponding decryption key. The detailed procedure of encryption and decryption is shown below.

Hierarchical structure in the access control.
In the process of encryption, certificate authority (CA) first establishes and makes public the function
The interpolation function is thus obtaining
When security class 3 wishes to obtain the decryption key DK5,
Key derivation phase
Step 1. Set the right of the host Si to access a certain DKt.
Step 2.The security class SCi uses its secret key SKi and the public function FDKt(x) to obtain DKt.
Suppose that a confidential document, the encryption key of which is DKt that is kept in a mobile agent, is to be transmitted to an assigned department (see Figure 1). A person with authorized access can substitute the secret key, SCi, into the interpolation function to obtain the corresponding decryption key.
Analysis of security
We would go over the security analyses of the Lagrange interpolation method in the context of common external attacks, reversed attacks, cooperative attacks, and many other sources of attacks. In addition, we would discuss from the viewpoint of attackers to compromise the proposed scheme to ensure that the method is secure.
External attacks
The attackers steal from outside. They hack valuable information to accumulate money. This situation could result in the divulgence of confidential information and damages. Accordingly, this becomes a serious issue in the process of security analyses.
Regarding external attack, attackers with the knowledge of public parameters are not able to obtain any decryption key DKt and, consequently, are not able to obtain any confidential file. If the external attackers wish to extract the secret key SKi from the interpolation function parameters
The interpolation function
Reversed attacks
The reversed attack is defined as a process in which the user with lower authority intends to access the higher level. Referring to Figure 2, SCj stands for a user with lower authority and SCi is the user with higher authority. If a user successfully carries out a reversed attack on a user who has higher authority, then the attacker could illegally obtain the secret key to access to the confidential documents. After hacking the information successfully, the attackers may tend to sell it which would result in loss to the organization. It is thus important to prevent reversed attack.

Reversed attacks.
Regarding the method proposed, we note that
Since the secret keys SKi in the parameters
Cooperative attacks
Cooperative attack means that a group of users try to cooperatively obtain the secret key of a user with higher access in the organization. Referring to Figure 3, SCj and SCk stand for users with lower authority and SCi for users with higher authority. Cooperative attack can therefore be concerned as several reversed attacks assembled together. Comparing with reversed attacks, there is more internal participation involved since attacks can pool the knowledge of their own secret keys.

Cooperative attacks.
As far as this problem is concerned, the secret keys should be randomly selected. It could remove the regularity among the secret keys and the possibility of deriving the secret key based on the knowledge of a set of other secret keys.
Since the method proposed applies to the organization without a definite hierarchical structure, the security classes can be viewed as independent units, so that the secret key of one security class cannot be obtained by a reversed attack carried out by a single user or by a cooperative attack carried out by a group of users.
By an analysis of the interpolation function
In the above expression, SK2, …, SK6 are unknown to the attackers. Suppose that SK2 stands for the secret key that cooperative attackers wish to obtain. Assume that the owners of SK3, …, SK6 are the cooperative attackers. With the knowledge of SK3, …, SK6, the cooperative attackers are not able to extract SK2 from
Equation attacks
In an equation attack, the attackers attempt to obtain the secret key of a user by analyzing a known equation.
Referring to Figure 3, SC1 and SC2 can derive the key DK2 through the interpolation function
On the right-hand side of the above equation, only the
Analysis of performance
We would address the computational overheads and storage in this subsection. Most of the published schemes associated with the Lagrange interpolation method did not follow an environment structure adopted by our proposed scheme. As a result, we compare our proposed scheme with those of Das et al. 5 and Chang et al. 9 since these two schemes follow a similar structure. It is shown in Knuth 11 that the process of interpolation (k+1) points using Newton’s formula requires (k2+k)/2 divisions and k2+k subtractions, where k is the degree of the interpolating polynomial.
As for the evaluation of the polynomial to derive the successor’s secret key, we can base on the knowledge of Knuth; 11 (2k – 1) multiplications, 2k additions, and one modular operation are demanded by applying Horner’s rule.
Therefore, our proposed scheme requires a computation time of
The scheme of Chang et al.,
9
which utilizes Newton’s interpolation formula, requires a computation time of
Following the same line of reasoning, the computation times for the key generation phase and the key derivation phase of the scheme of Das et al.
5
are given, respectively, by
We now consider the storage space required by each of the three schemes under comparison. For our proposed scheme, a storage space of (m+2)len is required for the public parameters and a storage space of len is required for each private key SKi of user SCi. For the scheme of Chang et al., a storage space of (2k+1)len is required for the public parameters Vi, Hi(x), and p. A storage space of length len is required for each private key Ki.
For the scheme of Das et al., 5 a storage space of (k+m)len is needed for the public parameters IDj and Hi(x) and a storage space of len is required for each private key. Since the number of security classes (k) is larger than the number of confidential files (m), our proposed scheme requires a smaller storage space than the other two schemes for most of the time.
We notice that the key operation12–14 used in constructing the three schemes under comparison is the same: modular exponentiation. The computational complexity of the schemes by Chang et al. 9 and Das et al. 5 is O(k2) in the number of modular hashing. The computational complexity of our proposed scheme is O(k2) in the number of modular exponentiation. The complexity and the storage requirement of the three schemes under comparison are listed in Table 1.
Analysis of computational complexity.
We now conduct a numerical experiment to compare the performance in terms of the computation time required by the key generation and derivation phases. Figure 4 shows the different computation times for the key generation phase of the three schemes versus the number of members of the hierarchy. The computation times for the proposed scheme, the scheme of Das et al., and the scheme of Chang et al. are shown using red, blue, and green lines, respectively. As the number of members reaches 1200, the computation times for the proposed scheme, the scheme of Das et al., and the scheme of Chang et al. are, respectively, 33.76, 29.94, and 43.02 s. We notice that the scheme of Das et al. consistently requires a smaller computation time than the proposed scheme, but the proposed scheme is better than the scheme of Chang et al.’s. This can be explained by the fact that the scheme of Das et al. uses a symmetric encryption/decryption algorithm to protect the secret keys and the proposed method and, on the other hand, uses an asymmetric encryption/decryption algorithm. Since a symmetric encryption/decryption algorithm is “faster” than an asymmetric encryption/decryption algorithm, it does not come as a surprise that the scheme of Das et al. outperforms the proposed scheme. However, we remark that an asymmetric encryption/decryption algorithm generally provides better security than a symmetric encryption/decryption algorithm.

Key generation phase.
We now consider the computation times required by the key derivation phase for the three schemes under comparison. The plots of the computation times that follow a structure similar to that shown in Figure 4 are presented in Figure 5. Again, the scheme of Chang et al. always required the highest computation time. The proposed scheme is slightly better than the scheme of Das et al. As explained in the previous paragraph, this is due to the difference in the efficiency of a symmetric encryption/decryption algorithm and an asymmetric encryption/decryption algorithm.

Key derivation phase.
Conclusion
We tend to develop a key management scheme to improve the security concern in data access. With the technology of mobile agents, we can easily build a hierarchical access control. On the other hand, the Lagrange interpolation and access control schemes provide management ability, and the classification and control of secure hierarchy are carried out. Moreover, the Lagrange interpolation method provides features of easy calculation and compromise resistance. To secure data access management efficiently, we implement mobile agents to confidential files across the system. Certain types of attacks are addressed. It is shown that our proposed method is secure against external attacks, reverse attacks, cooperative attacks, and equation attacks.
Footnotes
Handling Editor: Pascal Lorenz
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the Science & Technology Planning Fund of Quanzhou (No. 2016T009) and the Natural Science Foundation of Fujian Province of China (No. 2017J01109).
