IEEE Std 1609.2.1-2020 pdf download – IEEE Standard for Wireless Access in Vehicular Environments (WAVE)— Certificate Management Interfaces for End Entities

02-24-2022 comment

IEEE Std 1609.2.1-2020 pdf download – IEEE Standard for Wireless Access in Vehicular Environments (WAVE)— Certificate Management Interfaces for End Entities.
3. Definitions, acronyms, and abbreviations 3.1 Definitions For the purposes of this document, the following terms and definitions apply. The IEEE Standards Dictionary Online should be consulted for terms not defined in this clause. 13 Since this document specifies functionality that supports the functionality defined in IEEE Std 1609.2, definitions in IEEE Std 1609.2 also apply to this document. In particular, IEEE Std 1609.2 should be consulted for the definitions of the following terms: asymmetric cryptographic algorithm, authentication, authorization, certificate authority, certificate holder, certificate revocation list (CRL), certificate revocation list (CRL) signer, digital certificate, decrypt, elliptic curve cryptography, enrollment certificate, explicit certificate, hash value, implicit certificate, misbehavior, nonrepudiation, peer-to-peer certificate distribution, Provider Service Identifier, reconstruction value, revocation, root certificate, secure session, security management, self-signed certificate, Service Specific Permissions, symmetric cryptographic algorithm, valid certificate. The following definitions update the corresponding definitions in IEEE Std 1609.2: authorization certificate, end entity, enrollment certificate, misbehavior authority, pseudonym certificate, Transport Layer Security. application activities: The activities that are carried out to achieve the business or operational goals of a distributed application. application domain: The collection of application instances and management services that carry out and support a specific collection of application activities. application instance: A single instance of an implementation of a component of a distributed application, running on a single device (or perceived as running on a single device from the perspective of other participants in the application domain).
butterfly key process: A process used in certificate generation where an initial caterpillar public key is modified using an expansion function by the cocoon key expander (CKE) to create a cocoon public key, and further modified by a butterfly key expander (BKE) to produce a butterfly public key (or, an implicit certificate) for an explicit certificate, in such a way that only the holder of the original caterpillar private key can derive the butterfly private key corresponding to the butterfly public key (or, the implicit certificate). It is infeasible for a party that does not know the caterpillar private key to derive the corresponding butterfly private key. butterfly private key: The final cryptographic private key produced by the butterfly key process. butterfly public key: The final cryptographic public key produced by the butterfly key process. canonical identifier: A device identifier used to look up the device’s canonical key. canonical key: A device key with a long lifetime, used to request enrollment certificates. canonical key acceptance policy: A set of conditions applied to a canonical key and its metadata to determine whether that key is acceptable to authorize an enrollment certificate request received by a particular enrollment certificate authority (ECA).

Download infomation Go to download
Note: If you can share this website on your Facebook,Twitter or others,I will share more.

LEAVE A REPLY

Anonymous netizen Fill in information