Share This Author
A security credential management system for V2V communications
- William Whyte, A. Weimerskirch, Virendra Kumar, T. Hehn
- Computer ScienceIEEE Vehicular Networking Conference
- 1 December 2013
This system is currently being finalized, and it is the leading candidate design for the V2V security backend design in the US, subject to review by the US Department of Transportation and other stakeholders.
NTRUSIGN: Digital Signatures Using the NTRU Lattice
- J. Hoffstein, Nick Howgrave-Graham, J. Pipher, J. Silverman, William Whyte
- Computer Science, MathematicsCT-RSA
- 13 April 2003
A mechanism to encrypt to an arbitrary collection of identities using a variant of the Boneh-Franklin identity based encryption scheme that enables a simple mechanism to drive access control to broadcast encrypted data using user identities as the public keys.
SLOW: A Practical pseudonym changing scheme for location privacy in VANETs
- L. Buttyán, T. Holczer, A. Weimerskirch, William Whyte
- Computer ScienceIEEE Vehicular Networking Conference (VNC)
- 1 October 2009
This work argues that the risk of a fatal accident at a slow speed is low, and therefore, the scheme does not seriously impact safety-of-life, and relieves vehicles of the burden of verifying a potentially large amount of digital signatures, and thus, makes it possible to implement vehicle communications with less expensive equipments.
Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU
A Security Credential Management System for V2X Communications
- Benedikt Brecht, D. Therriault, R. Goudy
- Computer ScienceIEEE Transactions on Intelligent Transportation…
- 14 February 2018
A Security Credential Management System (SCMS) for vehicle-to-everything (V2X) communications is presented in this paper, which has been developed by the Crash Avoidance Metrics Partners LLC under a cooperative agreement with the USDOT.
Choosing Parameters for NTRUEncrypt
- J. Hoffstein, J. Pipher, J. Schanck, J. Silverman, William Whyte, Zhenfei Zhang
- Computer Science, MathematicsCT-RSA
- 14 February 2017
A method for generating parameter sets, and calculating security estimates, for NTRUEncrypt, and two new parameter sets designed to provide \(\ge 128\)-bit post-quantum security are described.
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
- Philip S. Hirschhorn, J. Hoffstein, Nick Howgrave-Graham, William Whyte
- Computer Science, MathematicsACNS
- 16 May 2009
We present the new NTRUEncrypt parameter generation algorithm, which is designed to be secure in light of recent attacks that combine lattice reduction and meet-in-the-middle (MITM) techniques. The…
Binary hash tree based certificate access management for connected vehicles
Binary Hash Tree based Certificate Access Management (BCAM) eliminates the need for vehicles to have bidirectional connectivity with the Security Credential Management System (SCMS) for certificate update, and significantly improves the ability of the SCMS to manage large-scale software and/or hardware compromise events.
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
- Nick Howgrave-Graham, J. Silverman, William Whyte
- Mathematics, Computer ScienceIACR Cryptol. ePrint Arch.
- 14 February 2005
We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security.
NAEP: Provable Security in the Presence of Decryption Failures
- Nick Howgrave-Graham, J. Silverman, A. Singer, William Whyte
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
NAEP, an efficient padding scheme similar to PSS-E designed especially for the NTRU one-way function, is introduced, and it is shown that with this padding scheme the authors can prove security in the presence of decryption failures, under certain explicitly stated assumptions.