搜索结果: 1-11 共查到“军事学 certificates”相关记录11条 . 查询时间(0.168 秒)
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
non-uniform certificates concurrent zero-knowledge
2019/6/4
We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a ``best-possible security'' against non-uniform polynomial-time att...
Privacy-preserving linkage/revocation of VANET certificates without LAs
Vehicular communications Security Security credential management system (SCMS)
2018/9/6
Vehicular communication (V2X) technologies are expected to be common in the future, providing better transportation safety and efficiency. However, their large-scale deployment requires addressing som...
ACPC: Efficient revocation of pseudonym certificates using activation codes
Vehicular communications certificate revocation activation codes
2018/4/10
Vehicular communication (V2X) technologies allow vehicles to exchange information about the road conditions and their own status, and thereby enhance transportation safety and efficiency. For broader ...
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Vehicular communications security Security Credential Management System (SCMS)
2018/3/6
Vehicular communication (V2X) technologies are expected to become increasingly common in the future. Although they enable improvements on transportation safety and efficiency, the large scale deployme...
The Viability of Post-quantum X.509 Certificates
post-quantum certificates hybrid certificates hash-based certificates
2018/1/19
If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic techniques, they would jeopardize the use of PKI X.509 certificates (RSA,...
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptogra...
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
deniability of implicit certificates elliptic curve cryptography ITS
2016/12/23
We specify Issue First Activate Later (IFAL). This is an ETSI type of V2X Public Key Infrastructure based on short-lived pseudonymous certificates without Certificate Revocation Lists. IFAL certificat...
Multiple and Unlinkable Public Key Encryption without Certificates
Public Key Encryption identity-based public keys random oracle model
2009/6/12
We newly propose a multiple and unlinkable identity-based
public key encryption scheme. Unlike the traditional public key encryp-
tion and identity-based encryption schemes, our scheme allows the us...
Efficient Revocation of Anonymous Group Membership Certificates and Anonymous Credentials
Efficient Revocation Anonymous Group Membership Certificates Anonymous Credentials
2009/4/16
An accumulator scheme, introduced be Benaloh and de Mare [BdM94] and further studied
by Baric and Ptzmann [BP97], is an algorithm that allows to hash a large set of inputs
into one short value, cal...
Colliding X.509 Certificates
Colliding X.509 Certificates MD5 hash function Public Key Infrastructure
2009/1/19
We announce a method for the construction of pairs of valid X.509 certificates in which the “to be signed” parts form a collision for the MD5 hash function. As a result the issuer signatures in the ce...
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Target Collision MD5 Different Identities
2008/12/24
We have shown how, at a cost of about 252 calls to the MD5 compression function,
for any two target messages m1 and m2, values b1 and b2 can be constructed such that
the concatenated values m1kb1 an...