{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:17:12Z","timestamp":1771489032596,"version":"3.50.1"},"reference-count":23,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2002,3,1]],"date-time":"2002-03-01T00:00:00Z","timestamp":1014940800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,3]]},"DOI":"10.1016\/s0167-4048(02)00211-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:59:15Z","timestamp":1027612755000},"page":"164-171","source":"Crossref","is-referenced-by-count":67,"title":["A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations"],"prefix":"10.1016","volume":"21","author":[{"given":"Victor R.L","family":"Shen","sequence":"first","affiliation":[]},{"given":"Tzer-Shyong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00211-0_BIB1","unstructured":"Denning, D.E., Akl, S.G. Morgenstern, M., and Neumann, P.G.: \u2018Views for multilevel database security\u2019, Proc. 1986 IEEE Symp. on Security and Privacy, Oakland, CA, 7\u20139 April 1986, pp. 156\u2013172."},{"key":"10.1016\/S0167-4048(02)00211-0_BIB2","doi-asserted-by":"crossref","unstructured":"Diffie, W. and Hellman, M.E.: \u2018New directions in cryptography\u2019, IEEE Transactions on Information Theory, 22, (6), 1976, pp. 644\u2013654.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB3","doi-asserted-by":"crossref","unstructured":"Fraim, L.J.: \u2018Scomp: a solution to multilevel security problem\u2019, IEEE Transactions on Computers, C-16, (7), July 1983, pp. 126\u2013143.","DOI":"10.1109\/MC.1983.1654440"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB4","doi-asserted-by":"crossref","unstructured":"Pohlig, S. and Hellman, M.E.: \u2018An improved algorithm for computing logarithms over GF(P) and its cryptographic significance\u2019, IEEE Transactions on Information Theory, IT-24, 1978, pp. 106\u2013110.","DOI":"10.1109\/TIT.1978.1055817"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB5","doi-asserted-by":"crossref","unstructured":"Sandhu, R. S.: \u2018Cryptographic implementation of a tree hierarchy for access control\u2019, Information Processing Letter, 27, 1988, pp. 95\u201398.","DOI":"10.1016\/0020-0190(88)90099-3"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB6","doi-asserted-by":"crossref","unstructured":"Hwang, M.S., Yang, W.P., and Chang, C.C.: \u2018Modified Chang-Hwang-Wu access control scheme\u2019, Electronics Letters, 29, (24), 1993, pp.2095\u20132096.","DOI":"10.1049\/el:19931400"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB7","doi-asserted-by":"crossref","unstructured":"Akl, S.G.and Taylor, P.D.: \u2018Cryptographic solution to a problem of access control in a hierarchy\u2019, ACM Transactions on Computer System, 1, (3), 1983, pp. 239\u2013247.","DOI":"10.1145\/357369.357372"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB8","doi-asserted-by":"crossref","unstructured":"MacKinnon, S.T., Taylor, P.D., Meijer, H., and Akl, S.G.: \u2018An optimal algorithm for assigning cryptographic keys to control access in a hierarchy\u2019, IEEE Transactions on Computers, C-34, (9), September 1985, pp. 797\u2013802.","DOI":"10.1109\/TC.1985.1676635"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB9","doi-asserted-by":"crossref","unstructured":"Harn, L. and Lin, H.Y.: \u2018A cryptographic key generation scheme for multilevel data security\u2019, Computers & Security, 9, 1990, pp. 539\u2013546.","DOI":"10.1016\/0167-4048(90)90132-D"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB10","unstructured":"Shen, V.R.L., Chen, T.-S., and Lai, F.: \u2018Modified cryptographic key assignment scheme for a group-oriented user hierarchy\u2019, IEICE Trans. Fundamentals, E80-A, (10), October 1987, pp. 2032\u20132034."},{"key":"10.1016\/S0167-4048(02)00211-0_BIB11","unstructured":"Shen, V.R.L., Chen, T.-S., and Lai, F.: \u2018Novel cryptographic key assignment scheme for dynamic access control in a hierarchy\u2019, IEICE Trans. Fundamentals, E80-A, (10), October 1987, pp. 2035\u20132037."},{"key":"10.1016\/S0167-4048(02)00211-0_BIB12","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Hwang, R.J., and Wu, T.C.: \u2018Cryptographic key assignment scheme for access control in a hierarchy\u2019, Information Systems, 17, (3), 1992, pp. 243\u2013247.","DOI":"10.1016\/0306-4379(92)90015-F"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB13","doi-asserted-by":"crossref","unstructured":"Chang, C.C. and Buehrer, D.J.: \u2018Access control in a hierarchy using a one-way trapdoor function\u2019, Computers and Mathematics with Applications, 26, (5), 1993, pp. 71\u201376.","DOI":"10.1016\/0898-1221(93)90075-7"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB14","doi-asserted-by":"crossref","unstructured":"Chick, G.C. and Tavares, S.E.: \u2018Flexible access control with master keys\u2019, Advances in Cryptology \u2014 CRYPTO\u201989, Springer-Verlag, 1990, pp. 316\u2013322","DOI":"10.1007\/0-387-34805-0_29"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB15","doi-asserted-by":"crossref","unstructured":"Tsai, H.M. and Chang, C.C.: \u2018A cryptographic implementation for dynamic access control in a user hierarchy\u2019, Computers & Security, 14, (2), 1995, pp. 857\u2013959.","DOI":"10.1016\/0167-4048(95)97049-G"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB16","unstructured":"Laih, C.S. and Hwang, T.L.: \u2018A branch oriented key management solution to dynamic access control in a hierarchy\u2019, IEEE Symposium on Applied Computing, 1991, pp.422\u2013429."},{"key":"10.1016\/S0167-4048(02)00211-0_BIB17","doi-asserted-by":"crossref","unstructured":"Wu, T.C. and Chang, C.C.: \u2018Controlling access in tree hierarchies\u2019, Information Sciences, 78, 1994, pp. 69\u201376.","DOI":"10.1016\/0020-0255(94)90020-5"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB18","unstructured":"Wu, T.C., Wu, T.S., and He, W.H.: \u2018Dynamic access control scheme based on the Chinese remainder theorem\u2019, Computer System Science and Engineering, 10, (2), 1995, pp. 92\u201399."},{"key":"10.1016\/S0167-4048(02)00211-0_BIB19","unstructured":"McCullough, D.: \u2018Specifications for multilevel security and a hook-up property\u2019, Proc. 1987 IEEE Symp. on Security and Privacy, April 27\u201329, 1987, Oakland, CA, pp. 161\u2013166."},{"key":"10.1016\/S0167-4048(02)00211-0_BIB20","doi-asserted-by":"crossref","unstructured":"Shen, V.R.L., Chen, T.-S., and Lai, F.: \u2018A cryptographic key assignment scheme for dynamic access control in a user hierarchy\u2019, IEE Procs. Computers and Digital Techniques, 146, (5), September 1999, pp. 235\u2013240.","DOI":"10.1049\/ip-cdt:19990311"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB21","doi-asserted-by":"crossref","unstructured":"Lin C.H.: \u2018Dynamic key management schemes for access control in a hierarchy\u2019, Computer Communications, 20, 1997, pp. 1381\u20131385.","DOI":"10.1016\/S0140-3664(97)00100-X"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB22","doi-asserted-by":"crossref","unstructured":"Lee, N.Y. and Hwang, T.: \u2018Comments on dynamic key management schemes for access in a hierarchy\u2019, Computer Communications, 22, 1999, pp. 87\u201389.","DOI":"10.1016\/S0140-3664(98)00216-3"},{"key":"10.1016\/S0167-4048(02)00211-0_BIB23","unstructured":"Knuth, D.E. The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, MA, 1981."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802002110?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802002110?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T16:45:15Z","timestamp":1579106715000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802002110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,3]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,3]]}},"alternative-id":["S0167404802002110"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00211-0","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,3]]}}}