搜索结果: 1-11 共查到“军事学 certificates”相关记录11条 . 查询时间(0.048 秒)
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
non-uniform certificates concurrent zero-knowledge
font style='font-size:12px;'>
2019/6/4
We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a ``best-possible security'' against non-uniform polynomial-time att...
Privacy-preserving linkage/revocation of VANET certificates without LAs
Vehicular communications Security Security credential management system (SCMS)
font style='font-size:12px;'>
2018/9/6
Vehicular communication (V2X) technologies are expected to be common in the future, providing better transportation safety and efficiency. However, their large-scale deployment requires addressing som...
ACPC: Efficient revocation of pseudonym certificates using activation codes
Vehicular communications certificate revocation activation codes
font style='font-size:12px;'>
2018/4/10
Vehicular communication (V2X) technologies allow vehicles to exchange information about the road conditions and their own status, and thereby enhance transportation safety and efficiency. For broader ...
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Vehicular communications security Security Credential Management System (SCMS)
font style='font-size:12px;'>
2018/3/6
Vehicular communication (V2X) technologies are expected to become increasingly common in the future. Although they enable improvements on transportation safety and efficiency, the large scale deployme...
The Viability of Post-quantum X.509 Certificates
post-quantum certificates hybrid certificates hash-based certificates
font style='font-size:12px;'>
2018/1/19
If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic techniques, they would jeopardize the use of PKI X.509 certificates (RSA,...
Encrypting Messages for Incomplete Chains of Certificates
key management PKI web of trust
font style='font-size:12px;'>
2017/8/17
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptogra...
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
deniability of implicit certificates elliptic curve cryptography ITS
font style='font-size:12px;'>
2016/12/23
We specify Issue First Activate Later (IFAL). This is an ETSI type of V2X Public Key Infrastructure based on short-lived pseudonymous certificates without Certificate Revocation Lists. IFAL certificat...
Multiple and Unlinkable Public Key Encryption without Certificates
Public Key Encryption identity-based public keys random oracle model
font style='font-size:12px;'>
2009/6/12
We newly propose a multiple and unlinkable identity-based
public key encryption scheme. Unlike the traditional public key encryp-
tion and identity-based encryption schemes, our scheme allows the us...
Efficient Revocation of Anonymous Group Membership Certificates and Anonymous Credentials
Efficient Revocation Anonymous Group Membership Certificates Anonymous Credentials
font style='font-size:12px;'>
2009/4/16
An accumulator scheme, introduced be Benaloh and de Mare [BdM94] and further studied
by Baric and Ptzmann [BP97], is an algorithm that allows to hash a large set of inputs
into one short value, cal...
Colliding X.509 Certificates
Colliding X.509 Certificates MD5 hash function Public Key Infrastructure
font style='font-size:12px;'>
2009/1/19
We announce a method for the construction of pairs of valid X.509 certificates in which the “to be signed” parts form a collision for the MD5 hash function. As a result the issuer signatures in the ce...
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Target Collision MD5 Different Identities
font style='font-size:12px;'>
2008/12/24
We have shown how, at a cost of about 252 calls to the MD5 compression function,
for any two target messages m1 and m2, values b1 and b2 can be constructed such that
the concatenated values m1kb1 an...