An efficient hierarchical key management scheme based on elliptic curves
From MaRDI portal
Publication:4465486
Recommendations
- Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
- Hierarchical management scheme by local fields
- A practical and dynamic key management scheme for a user hierarchy
- A model of hierarchical key assignment scheme
- Access control in user hierarchy based on elliptic curve cryptosystem
Cites work
Cited in
(6)- A hierarchical key management scheme using the Chinese remainder theorem
- Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
- Quantum cryptography and security analysis
- Access control in user hierarchy based on elliptic curve cryptosystem
- Hierarchical management scheme by local fields
- An authenticated key scheme over elliptic curves for topological networks
This page was built for publication: An efficient hierarchical key management scheme based on elliptic curves
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4465486)