摘要:
An approach is provided for preserving privacy for appointment scheduling. A scheduling platform receives a request to schedule an appointment among one or more users. The scheduling platform determines availability information for the one or more users from one or more respective devices, wherein the availability information is encrypted using homomorphic encryption. The scheduling platform then processes and/or facilitates a processing of the availability information using, at least in part, one or more homomorphic functions to determine one or more recommended time slots for the appointment.
摘要:
An approach is provided for preserving privacy for appointment scheduling. A scheduling platform receives a request to schedule an appointment among one or more users. The scheduling platform determines availability information for the one or more users from one or more respective devices, wherein the availability information is encrypted using homomorphic encryption. The scheduling platform then processes and/or facilitates a processing of the availability information using, at least in part, one or more homomorphic functions to determine one or more recommended time slots for the appointment.
摘要:
A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided. A method for certificate authorities (CA) that use Bloom filters for certificate revocation list (CRL) compression that enables the CA to hash only the entry that is to be un-revoked so that a good compression rate may be provided while avoiding computation of the entire CRL for each un-revocation.
摘要:
A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided. A method for certificate authorities (CA) that use Bloom filters for certificate revocation list (CRL) compression that enables the CA to hash only the entry that is to be un-revoked so that a good compression rate may be provided while avoiding computation of the entire CRL for each un-revocation.
摘要:
Message authentication in an ad-hoc network. Upon creation of a message, a message authentication code is created using a key shared with members of a group comprising a subset of nodes of the ad-hoc network. The message authentication code may be created using a cryptographic process having the message and a message identifier as inputs. After or in parallel with broadcast of the message, a pointer to the message is broadcast. The message authentication code is publicly broadcast and those members of the group among which the key has been shared are able to authenticate the message as coming from a particular sender.
摘要:
It is disclosed a method comprising receiving, prior to a handover operation, first key indication information, creating, prior to the handover operation, key information based on the received first key indication information, retaining the created key information, sending, after the handover operation, the received first key indication information associated with the key information created prior to the handover operation, and retrieving, after the handover operation, the retained key information based on the first key indication information; and a method comprising generating, prior to the handover operation, the first key indication information associated with key information intended to be created, sending, prior to the handover operation, the generated first key indication information, and receiving, after the handover operation, second key indication information corresponding to the generated first key indication information.
摘要:
It is disclosed a method comprising receiving, prior to a handover operation, first key indication information, creating, prior to the handover operation, key information based on the received first key indication information, retaining the created key information, sending, after the handover operation, the received first key indication information associated with the key information created prior to the handover operation, and retrieving, after the handover operation, the retained key information based on the first key indication information; and a method comprising generating, prior to the handover operation, the first key indication information associated with key information intended to be created, sending, prior to the handover operation, the generated first key indication information, and receiving, after the handover operation, second key indication information corresponding to the generated first key indication information.
摘要:
The present invention relates to a method, tunnel protocol layer, and network device for securing a data packet on a network link. A security layer is provided in the tunneling protocol layer of the wireless network, and a secured data packet is generated by adding to the data packet a header in accordance with said security layer of the tunneling protocol. The secured data packet is then transmitted over the link by using a link layer connection.
摘要:
Message authentication in an ad-hoc network. Upon creation of a message, a message authentication code is created using a key shared with members of a group comprising a subset of nodes of the ad-hoc network. The message authentication code may be created using a cryptographic process having the message and a message identifier as inputs. After or in parallel with broadcast of the message, a pointer to the message is broadcast. The message authentication code is publicly broadcast and those members of the group among which the key has been shared are able to authenticate the message as coming from a particular sender.
摘要:
Techniques for determining context based on a spatial trail include determining data that indicates a first trail comprising a plurality of locations of finite spatial granularity at a corresponding plurality of times. The techniques also comprise determining data that indicates at least one criterion for belonging in a group. The criterion indicates a first spatial granularity for at least a first location at a corresponding first time in the first trail. The techniques further comprise determining whether a particular entity belongs in the group based, at least in part, on the criterion and a second trail for the particular entity. A trail for any entity comprises a plurality of locations of finite spatial granularity indicating actual locations of the entity at a corresponding plurality of times.