The Community for Technology Leaders
Green Image
Issue No. 09 - September (1985 vol. 34)
ISSN: 0018-9340
pp: 797-802
S.J. Mackinnon , Thousand Island Secondary School, Brockville, Ont., Canada, and the Department of Mathematics and Statistics, Queen's University
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.
partially ordered set, Access control, canonical assignment, cooperative attack, cryptographic key, hierarchy, key generation algorithm
S.G. Akl, S.J. Mackinnon, P.D. Taylor, H. Meijer, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy", IEEE Transactions on Computers, vol. 34, no. , pp. 797-802, September 1985, doi:10.1109/TC.1985.1676635
88 ms
(Ver 3.3 (11022016))