An efficient hierarchical key management scheme based on elliptic curves
From MaRDI portal
Publication:4465486
DOI10.1080/09720502.2002.10700323zbMATH Open1042.94013OpenAlexW1989422653MaRDI QIDQ4465486FDOQ4465486
Authors: Chu-Hsing Lin, Jia-Hao Lee
Publication date: 9 June 2004
Published in: Journal of Interdisciplinary Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720502.2002.10700323
Recommendations
- Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
- Hierarchical management scheme by local fields
- A practical and dynamic key management scheme for a user hierarchy
- A model of hierarchical key assignment scheme
- Access control in user hierarchy based on elliptic curve cryptosystem
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Network protocols (68M12)
Cites Work
Cited In (6)
- Access control in user hierarchy based on elliptic curve cryptosystem
- Hierarchical management scheme by local fields
- A hierarchical key management scheme using the Chinese remainder theorem
- An authenticated key scheme over elliptic curves for topological networks
- Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
- Quantum cryptography and security analysis
This page was built for publication: An efficient hierarchical key management scheme based on elliptic curves
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4465486)