CTng: Secure Certificate and Revocation Transparency.
Hemi LeibowitzHaitham GhalwashEwa SytaAmir HerzbergPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- public key encryption
- public key cryptography
- public key infrastructure
- authentication mechanism
- public key
- key management
- key distribution
- factor authentication
- access control
- authentication and access control
- trusted third party
- data encryption
- elliptic curve
- security issues
- blind signature
- security services
- encryption scheme
- key exchange
- security requirements
- data sets
- security model
- security mechanisms
- security architecture
- security protocols
- security analysis
- proxy re encryption
- third party
- covert channel
- lightweight
- identity based encryption
- resource constrained