The Community for Technology Leaders
RSS Icon
Issue No.09 - September (1985 vol.34)
pp: 797-802
S.J. Mackinnon , Thousand Island Secondary School, Brockville, Ont., Canada, and the Department of Mathematics and Statistics, Queen's University
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.
partially ordered set, Access control, canonical assignment, cooperative attack, cryptographic key, hierarchy, key generation algorithm
S.J. Mackinnon, P.D. Taylor, H. Meijer, S.G. Akl, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy", IEEE Transactions on Computers, vol.34, no. 9, pp. 797-802, September 1985, doi:10.1109/TC.1985.1676635
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool