Certificate Revocation Protocol Using k-Ary Hash Tree (Special Issue on Internet Technology)
スポンサーリンク
概要
- 論文の詳細を見る
Certificate Revocation is a critical issue for a practical, public-key infrastructure. A new efficient revocation protocol using a one-way hash tree structure (instead of the classical list structure, which is known as a standard for revocation), was proposed and examined to reduce communication and computation costs. In this paper, we analysis a k-ary hash tree for certificate revocation and prove that k=2 minimizes communication cost.
- 社団法人電子情報通信学会の論文
- 2001-08-01
著者
-
Kikuchi H
Department Of Information Media Technology School Of Information Technology And Electronics Tokai Un
-
Nakanishi S
Department Of Information Science School Of Information Technology And Electronics Tokai University
-
Nakanishi Shohachiro
Department Of Electrical Engineering Faculty Of Engineering
-
Kikuchi Hiroaki
Department Electrical Engineering Tokai Univeristy
-
ABE KENSUKE
Panasonic Mobile Communication Co. Ltd.
-
ABE Kensuke
Department Electrical Engineering, Tokai University
-
Abe K
Panasonic Mobile Communication Co. Ltd.
関連論文
- Oblivious Comparator and Its Application to Secure Auction Protocol (特集:プライバシを保護するコンピュータセキュリティ技術)
- Microwave coagulation therapy for hepatocellular carcinoma
- Heparin Reduces Serum Levels of Endothelin-1 and Hepatic Ischemia Reperfusion Injury in Rabbits
- Comparative in vitro activity of carbapenem antibiotics against respiratory pathogens isolated in recent years
- Identification of Mycobacterium avium Complex Isolated in Eastern and Central Japan by Using DNA Probes
- Multi-Round Anonymous Auction Protocols (Special Issue on Internet Technology and Its Applications)
- Enhancement of the Efficacy of Anticancer Drugs with Electroporation : Successful Electrochemotherapy against Gastric Cancer Cell Lines in Vivo and in Vitro
- Enhancing the Effect of Anticancer Drugs against the Colorectal Cancer Cell Line with Electroporation
- Solutions of Type 2 Fuzzy Equations
- Features of DNA Oligonucleosomal Fragmentation in Human Tumor Cell Lines and Its Detection by Flow Cytometry : Utility and Limitations
- Attaching of Poly(acrylic acid) to Inorganic Surface and Its Application to Enzyme Immobilization
- Solutions in Composite Type 2 Fuzzy Relation Equations
- Inversibility of Fluid Mappers and Its Applications to Electric Fields
- Improving Generalization Performance by Information Minimization
- Kernel Hidden Unit Analysis : Network Size Reduction by Entropy Minimization-
- Side Chain Dynamics in Poly(ethyl acrylate) Studied by Molecular Dynamics Simulation
- Online Certification Status Verification with a Red-Black Hash Tree (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Online Certification Status Verification with a Red-Black Hash Tree
- Certificate Revocation Protocol Using k-Ary Hash Tree (Special Issue on Internet Technology)
- Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm
- FOREWORD
- Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm (SCHOOL OF INFORMATION TECHNOLOGY AND ELECTRONICS)
- Time Zone Correlation Analysis of Malware/Bot Downloads
- Development of Remote Control Vehicle via Internet and its Usability in terms of Quality of Service
- Privacy-preserving Collaborative Filtering Using Randomized Response
- Privacy-preserving Collaborative Filtering Using Randomized Response
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm
- Online Certification Status Verification with a Red-Black Hash Tree