Mathematical cryptology for computer scientists and mathematicians
Mathematical cryptology for computer scientists and mathematicians
A course in number theory and cryptography
A course in number theory and cryptography
A cryptographic key generation scheme for multilevel data security
Computers and Security
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Research: Remote scheme for password authentication based on theory of quadratic residues
Computer Communications
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
Research note: Comments on `dynamic key management schemes for access control in a hierarchy'
Computer Communications
Research note: A conference key distribution scheme based on the theory of quadratic residues
Computer Communications
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Hi-index | 0.00 |
In 1997, Lin [1] proposed a dynamic key management scheme using user hierarchical structure. After that, Lee [2] brought to two comments on Lin's method. In 2002, Lin [3] proposed a more efficient hierarchical key management scheme based on Elliptic Curve. Lin's efficient scheme solves the weaknesses appearing in Lee's scheme in [1]. In this paper, we further use Quadratic Residues (Q.R.) theorem to reduce the computing complexity of Lin's method.