This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
September 1985 (vol. 34 no. 9)
pp. 797-802
S.J. Mackinnon, Thousand Island Secondary School, Brockville, Ont., Canada, and the Department of Mathematics and Statistics, Queen's University
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.
Index Terms:
partially ordered set, Access control, canonical assignment, cooperative attack, cryptographic key, hierarchy, key generation algorithm
Citation:
S.J. Mackinnon, P.D. Taylor, H. Meijer, S.G. Akl, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy," IEEE Transactions on Computers, vol. 34, no. 9, pp. 797-802, Sept. 1985, doi:10.1109/TC.1985.1676635
Usage of this product signifies your acceptance of the Terms of Use.