Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementation of butterfly key expansion scheme

A key extension and butterfly technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as inability to use

Pending Publication Date: 2021-12-24
VOLKSWAGEN AG
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the described solution cannot be used in a market that only offers traditional certificate authorities for pseudonymous certificate generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation of butterfly key expansion scheme
  • Implementation of butterfly key expansion scheme
  • Implementation of butterfly key expansion scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to better understand the principle of the present invention, exemplary embodiments of the present invention are explained in more detail below with reference to the accompanying drawings. The drawings and descriptions provided herein may have been simplified in order to illustrate aspects relevant to a clear understanding of the devices, systems and methods described herein, while for clarity the other aspects of. Those of ordinary skill in the art will recognize that other elements and / or operations may be desired and / or required in order to implement the devices, systems, and methods described herein. Because these elements and operations are well known in the art, and because they do not promote a better understanding of the present disclosure, a discussion of these elements and operations is not provided here. However, the disclosure is considered to inherently include all such elements, changes and modifications of the described aspects known to those of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Implementation of a butterfly key expansion scheme The present disclosure is related to methods, computer programs, and registration authority modules for implementing a butterfly key expansion scheme. The present disclosure is further related to a security credential management system using such methods, computer programs, or registration authority modules for implementing a butterfly key expansion scheme. In a first step, a public caterpillar signing key of a private / public caterpillar signing key pair and a first pseudorandom function are received (S1) from a requesting device. The public caterpillar signing key is expanded (S2) into public cocoon signing keys using the first pseudorandom function. Certificate signing requests are then generated (S4) based on the public cocoon signing keys, e.g. by creating (S3) a public butterfly signing key from each public cocoon signing key and inserting each public butterfly signing key into a corresponding certificate signing request. The certificate signing requests are subsequently sent (S5) to a certificate authority module. In response, signed pseudonym certificates are received (S6) from the certificate authority module. The signed pseudonym certificates are then encrypted (S7) to generate response packages. The resulting response packages may further be signed (S8) and provided (S9) for download by the requesting device.

Description

technical field [0001] The present disclosure relates to methods, computer programs and registration authority modules for implementing the butterfly key expansion scheme. The present disclosure also relates to a security credential management system using such a method, computer program or registration authority module for implementing the butterfly key expansion scheme. Background technique [0002] As the demand for smart delivery vehicles increases, security and privacy requirements are paramount. For example, the authenticity of data exchanged via vehicle-to-vehicle or vehicle-to-infrastructure communication needs to be ensured to prevent misuse of intelligent transportation systems. While traditional certificates can be used for this purpose, this approach conflicts with requirements regarding user privacy. [0003] In response to the requirements of authenticity and privacy, various proposals for vehicle public key infrastructure have been published. One method of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3268H04L9/3066H04L2209/84H04L2209/42H04L63/0823H04L9/0869H04L9/3263
Inventor B.布雷赫特
Owner VOLKSWAGEN AG