Appendix 00: Acronyms And Terminologies Used

Mi'kail Eli'yah
8 min readJul 29, 2021
[A]
A6:
1. Authentication,
2. Attestation (verify a posit or premise),
3. Authorization,
4. Access and
5. Audit*
6. Assertions (claim a posit or premise)
*Data audit are subjected to AssertionsAAD:
Additional Authenticated Data
AEAD:
Authenticated Encryption with Associated Data (a.k.a. Authenticated Encryption mode)
AES:
Advanced Encryption Scheme
AES-CTR:
AES – Counter mode
AES-CBC:
AES – Cipher Block Chaining
AES-CFB:
AES – Cipher Feedback
AES-CCM:
AES – Counter with CBC-MAC
AES-ECB:
AES – Electronic Code Book
AES-GCM:
AES – Galois/Counter Mode
AES-OCB:
AES – Offset Codebook Mode
AES-OFB:
AES – Output Feedback
AES-XEX:
AES – Xor-Encrypt Encrypt-xor
AES-XTS:
AES – XEX-based Tweaked Codebook mode with Ciphertext weaked Codebook mode with Ciphertext Stealing (XEX = Xor tealing)
[B]
BBS (signature):
Boneh, Boyen and Shacham signature (2004). A signature from a group of members, anonymously signed only by 1 from within.
BIST:
Built-In Self-Test
BLS (signature):
Boneh–Lynn–Shacham signature produces short signatures, using EC pairing (aka bilinear maps).
[C]
CA:
Certificate Authority
The collection of the information technology components (including one or more trustworthy systems), along with the procedures and operations of the CA system, as specified in the Certificate Practice Statements. Entity trusted by >= 1 entities to create, assign, and revoke or hold public key certificates.
CC:
Common Criteria
CCA:
Chosen Ciphertext Attack
CL (signature):
Camenisch-Lysyanskaya signature ([paper], 2001) for anonymous signing.
CPA:
Chosen Plaintext Attack
CRT:
Chinese Remainder Theorem
CSPRNG:
Cryptographically Secure PRNG
[D]
DH:
Diffie-Hellman
DGHV:
Dijk, Gentry, Halevi and Vaikuntanathan, 2010 (Fully homomorphic encryption scheme)
DHE:
DH Ephermeral
DHKE:
DH Key Exchange
DLP:
discrete logarithm…

--

--