27
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchiesFootnote

Pages 463-468 | Received 04 Jan 1999, Published online: 19 Mar 2007
 

Abstract

Many methods based on cryptography have been proposed to solve the problem of access control in hierarchic structures. However, these schemes are only used in symmetric (or one-key) cryptosystems. In this article, we propose a new multilevel access control scheme for a totally-ordered hierarchy that can be used in asymmetric (or two-key) cryptosystem. It is well known that there are two main advantages in asymmetric cryptography: key distribution and authentication. Our scheme is, to our best knowledge, the first to be used as an asymmetric cryptosystem.

C.R. Category:

This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC88-2213-E-324-002

This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC88-2213-E-324-002

Notes

This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC88-2213-E-324-002

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.