搜索结果: 1-15 共查到“军队指挥学 PKI”相关记录33条 . 查询时间(0.046 秒)
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Certificate-based PKI Identity-based public key cryptography (ID-PKC) Hybrid PKI
2019/7/15
Traditional Certificate-based public key infrastructure (PKI) suffers from the problem of certificate overhead like its storage, verification, revocation etc. To overcome these problems, the idea of c...
In this work we apply the systematic approach of game-based security specifications and proofs by reductions, to the design and evaluation of public key infrastructure (PKI) schemes. The importance of...
CertLedger: A New PKI Model with Certicate Transparency Based on Blockchain
PKI SSL/TLS Certicate Transparency
2018/11/12
In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues. To prevent such iss...
The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than ...
It is well known that multivariate quadratic (MQ) digital signature schemes have small signatures but huge public keys. However, in some settings, such as public key infrastructure (PKI), both variabl...
A Decentralized PKI In A Mobile Ecosystem
PKI GSM
2017/2/20
A public key infrastructure (PKI) supports the authentication and distribution of public encryption keys, enabling secure communication among other uses. However, PKIs rely heavily on a centralized tr...
IKP: Turning a PKI Around with Blockchains
public-key infrastructures blockchain smart contracts
2016/12/8
Man-in-the-middle attacks in TLS due to compromised CAs have been mitigated by log-based PKI enhancements such as Certificate Transparency. However, these log-based schemes do not offer sufficient inc...
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Web PKI SSL/TLS man-in-the-middle attack
2016/2/23
. SSL/TLS is the de facto protocol for providing secure communication
over the Internet. It relies on the Web PKI model for authentication
and secure key exchange. Despite its relatively successful ...
Universally Composable Authentication and Key-exchange with Global PKI
public-key infrastructure message authentication digital signatures key exchange
2016/1/9
Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions
based on public-key infrastructure (PKI) are prevalent. Still, the state of the art in composable se...
Cryptographic accumulators are a tool for compact set representation
and secure set membership proofs. When an element is added
to a set by means of an accumulator, a membership witness is generated...
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Internet security CA compromise
2014/3/13
The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issu...
The steadily growing number of certication authorities (CAs) assigned to the Web Public Key Infrastructure (Web PKI) and trusted by current browsers imposes severe security issues. Apart from being i...
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
applications key management
2014/3/12
We present the Plug-and-Play IP Security (PnP-IPsec) protocol. PnP-IPsec automatically establishes IPsec security associations between gateways, avoiding the need for manual administration and coordin...
Readers Behaving Badly:Reader Revocation in PKI-Based RFID Systems
Reader Revocation PKI-Based RFID Systems
2009/9/27
Recent emergence of relatively inexpensive RFID tags capable of performing pub-
lic key operations motivates new RFID applications, including electronic travel documents,
identification cards and pa...