Distributed assignment of cryptographic keys for access control in a hierarchy

Bao Min Shao*, Jing Jang Hwang, Pe Cheng Wang

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

8 Scopus citations

Abstract

The problem of how to control access in a user hierarchy by cryptography was explored recently. However, these researches focus on the centralized environment. This paper presents a new distributed approach to assigning cryptographic keys which enables a member of the organization to derive, from his own key, the keys of members below him in the hierarchy, and consequently to have access to information enciphered under those keys. This proposed scheme also maintains the strength of adding new security classes into a partially ordered hierarchy without affecting the existing keys.

Original languageEnglish
Pages (from-to)79-84
Number of pages6
JournalComputers and Security
Volume13
Issue number1
DOIs
StatePublished - 02 1994
Externally publishedYes

Keywords

  • Access control
  • Cryptography
  • DES
  • Distributed algorithm
  • Key assignment

Fingerprint

Dive into the research topics of 'Distributed assignment of cryptographic keys for access control in a hierarchy'. Together they form a unique fingerprint.

Cite this