Abstract:
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level...Show MoreMetadata
Abstract:
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.
Published in: IEEE Transactions on Computers ( Volume: C-34, Issue: 9, September 1985)