An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New Key Generation Algorithms for Multilevel Security
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Cryptology: computational complexity and applications
Cryptology: computational complexity and applications
Key management for encrypted broadcast
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
Secure and efficient key management for dynamic multicast groups
ACM SIGOPS Operating Systems Review
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Broadcast encryption with short keys and transmissions
Proceedings of the 3rd ACM workshop on Digital rights management
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Hi-index | 0.00 |
We show how to create a master key scheme for controlling access to a set of services. Each master key is a concise representation for a list of service keys, such that only service keys in this list can be computed easily from the master key. Our scheme is more flexible than others, permitting hierarchical organization and expansion of the set of services.