搜索结果: 1-15 共查到“密码学 certificate”相关记录24条 . 查询时间(0.041 秒)
A certificate thumbprint is a hash of a certificate, computed over all certificate data and its signature. Thumbprints are used as unique identifiers for certificates, in applications when making trus...
qSCMS: Post-quantum certificate provisioning process for V2X
Vehicular communications (V2X) post-quantum security lattice-based cryptography
2019/1/4
Security and privacy are paramount in the field of intelligent transportation systems (ITS). This motivates many proposals aiming to create a Vehicular Public Key Infrastructure (VPKI) for managing ve...
The security of web communication via the SSL/TLS protocols relies on safe distributions of public keys associated with web domains in the form of X.509X.509 certificates. Certificate authorities (CAs...
Blind Certificate Authorities
anonymity MPC TLS
2018/11/2
We explore how to build a blind certificate authority (CA). Unlike conventional CAs, which learn the exact identity of those registering a public key, a blind CA can simultaneously validate an identit...
Binary Hash Tree based Certificate Access Management
Binary tree certificate access management
2017/8/10
We present a certificate access management system to support the USDOT's proposed rule on Vehicle-to-Vehicle (V2V) communications, Federal Motor Vehicle Safety Standard (FMVSS) No.~150. Our proposal, ...
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
signatures subversion mass surveillance
2016/12/8
This paper presents highly efficient designs of double authentication preventing signatures (DAPS). In a DAPS, signing two messages with the same first part and differing second parts reveals the sign...
Secure Logging Schemes and Certificate Transparency
Certificate Transparency public key infrastructures (PKI) logging schemes
2016/5/11
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
authenticated key agreement certificated-based cryptography public key repalcement attack
2016/1/3
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptograp...
Certificate-Based Encryption Resilient to Key Leakage
certificate-based encryption master secret key leakage dual system encryption
2015/12/31
Certificate-based encryption (CBE) is an important class of public key encryption but the
existing schemes are secure only under the premise that the decryption key (or private key) and master
priva...
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
secret sharing threshold cryptography zero knowledge
2015/12/31
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, ev...
The most widely used secure Internet communication standard TLS (Transport Layer Security) has an optional client certificate authentication feature that in theory has significant security advantages ...
Enhanced certificate transparency and end-to-end encrypted mail
public key certificates email security
2014/3/8
The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend "certificate t...
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Proxy signatures digital signatures
2014/3/10
Proxy signatures allow an entity (the delegator) to delegate his signing capabilities to other entities (called proxies), who can then produce signatures on behalf of the delegator. Typically, a deleg...
Certificate-Based Signcryption: Security Model and Efficient Construction
public-key cryptography / Certificate-based signcryption, Key replacement attack, Insider security, Security model, Chosen-ciphertext security, Existential unforgeability
2012/3/23
Signcryption is an important cryptographic primitive that simultaneously achieves confidentiality and authentication in an efficient manner. In 2008, Luo et al. introduced the notion of certificate-ba...