Corrupting a hash value corresponding to a key based on a revocation of the key
Abstract:
A request associated with a revocation of a key may be received. A hash value corresponding to the key that is stored in a memory may be identified. Furthermore, the hash value that is stored in the memory may be corrupted in response to the request associated with the revocation of the key.
Information query
Patent Agency Ranking
0/0