# Appendix 00: Acronyms And Terminologies Used

8 min readJul 29, 2021

[A]

A6:

1.,Authentication

2.(verify a posit or premise),Attestation

3.,Authorization

4.andAccess

5.*Audit

6.(claim a posit or premise)*Data audit are subjected toAssertionsAAD:Assertions

Additional Authenticated DataAEAD:

Authenticated Encryption with Associated Data (a.k.a. Authenticated Encryption mode)AES:

Advanced Encryption SchemeAES-CTR:

AES – Counter modeAES-CBC:

AES – Cipher Block ChainingAES-CFB:

AES – Cipher FeedbackAES-CCM:

AES – Counter with CBC-MACAES-ECB:

AES – Electronic Code BookAES-GCM:

AES – Galois/Counter ModeAES-OCB:

AES – Offset Codebook ModeAES-OFB:

AES – Output FeedbackAES-XEX:

AES – Xor-Encrypt Encrypt-xorAES-XTS:

AES – XEX-based Tweaked Codebook mode with Ciphertext weaked Codebook mode with Ciphertext Stealing (XEX = Xor tealing)[B]BBS (signature):

Boneh, Boyen and Shacham signature (2004). A signature from a group of members, anonymously signed only by 1 from within.BIST:

Built-In Self-TestBLS (signature):

Boneh–Lynn–Shacham signature produces short signatures, using EC pairing (aka bilinear maps).[C]CA:

Certificate Authority

The collection of the information technology components (including one or more trustworthy systems), along with the procedures and operations of the CA system, as specified in the Certificate Practice Statements. Entity trusted by >= 1 entities to create, assign, and revoke or hold public key certificates.CC:

Common CriteriaCCA:

Chosen Ciphertext AttackCL (signature):

Camenisch-Lysyanskaya signature ([paper], 2001) for anonymous signing. CPA:

Chosen Plaintext AttackCRT:

Chinese Remainder TheoremCSPRNG:

Cryptographically Secure PRNG[D]DH:

Diffie-HellmanDGHV:

Dijk, Gentry, Halevi and Vaikuntanathan, 2010 (Fully homomorphic encryption scheme)DHE:

DH EphermeralDHKE:

DH Key ExchangeDLP:

discrete logarithm…