Abstract | ||
---|---|---|
In this paper we give a classification of delegation schemes into six main classes. Tosolve the problem with simply chained tokens in cascaded delegations we introducethe concept of hierarchical delegation tokens. To realize this concept we use theSchnorr signature scheme, self--certified public keys introduced by Girault and theconcept of hierarchical key generation first presented by Guenther. For all classeswe present efficient delegation schemes, which are efficient in generating and... |
Year | Venue | Keywords |
---|---|---|
1996 | Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II | hierarchical delegation token,new approach,public key,distributed systems,access control,delegation |
Field | DocType | ISBN |
Key generation,Cryptography,Computer science,Computer network,Access control,Delegation,Public-key cryptography,Schnorr signature | Conference | 0-412-79780-1 |
Citations | PageRank | References |
16 | 1.97 | 3 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yun Ding | 1 | 16 | 1.97 |
Patrick Horster | 2 | 371 | 51.55 |
Holger Petersen | 3 | 16 | 1.97 |