An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy

  • Authors:
  • Stephen J. MacKinnon;Peter D. Taylor;Henk Meijer;Selim G. Akl

  • Affiliations:
  • Queen's Univ., Kingston, Ont., Canada;Queen's Univ., Kingston, Ont., Canada;Queen's Univ., Kingston, Ont., Canada;Queen's Univ., Kingston, Ont., Canada

  • Venue:
  • IEEE Transactions on Computers
  • Year:
  • 1985

Quantified Score

Hi-index 14.99

Visualization

Abstract

A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.