IEEE Std 1609.2-2016
IEEE Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management
Messages
Copyright © 2016 IEEE. All rights reserved.
certificate holder: The entity authorized to use a particular digital certificate to establish trust. The
certificate holder can carry out operations using the private key corresponding to the certficate’s public key.
A certificate holder’s certificate is referred to as a locally held certificate.
certificate management information: Information that allows the secure data service to determine the
trustworthiness of certificates and received data.
certificate revocation list (CRL) distribution center: An entity that stores and distributes certificate
revocation lists (CRLs).
certificate revocation list (CRL) series (CRL series): An integer used to assign different certificates
issued by the same certificate authority (CA) to distinct sets, such that the certificates in different sets
appear on different revocation lists if revoked.
certificate revocation list (CRL): A list identifying certificates that have been revoked. See: revocation.
certificate revocation list (CRL) signer: An entity authorized to sign certificate revocation lists (CRLs).
certificate signing request (CSR): A protocol data unit (PDU) sent from an entity to a certificate authority
(CA), requesting that the CA issues a certificate on behalf of the entity.
chains to: A digital certificate A chains to another certificate B if B is above A in the certificate chain
(q.v.) from A to the root.
complete certificate chain: A certificate chain in which the top certificate is a root certificate and the
bottom certificate is an end-entity certificate.
confidentiality: A cryptographic service that provides assurance that only the intended recipients of a
protocol data unit (PDU) can read it.
consistency conditions: Criteria for validity of a signed protocol data unit (PDU) that depend only on the
contents of the signed secured protocol data unit (SPDU) and not on the state of the receiver.
counter mode with cipher block chaining message authentication code (CCM): A mode of operation of
a block cipher where the data is encrypted with a keystream, which in turn is generated by encrypting an
incrementing counter, and in turn authenticated with a message authentication code calculated using cipher
block chaining mode.
critical information field: An information field necessary to establish the validity of a signed secured
protocol data unit (SPDU).
cryptographic type (of a certificate): How a certificate transfers information about its associated public
key (q.v.). Cryptographic types of certificate are: implicit certificate; explicit certificate.
cryptographic verification: The process of determining whether a signature on a signed secured protocol
data unit (SPDU) is consistent with the SPDU and the private key.
cryptographically secure hash function: A function that maps an arbitrary-length input into a fixed-
length output (the hash value) such that (a) it is computationally infeasible to find an input that maps to a
specific hash value and (b) it is computationally infeasible to find two inputs that map to the same hash
value. All hash functions used in this document are cryptographically secure hash functions.
Cryptomaterial Handle: A reference to a private key and the associated public key or certificate, used to
indicate to the secure data service that the referenced key should be used in a particular operation.
Authorized licensed use limited to: Northeastern University. Downloaded on October 10,2018 at 13:43:00 UTC from IEEE Xplore. Restrictions apply.