This paper addresses the certificate revocation problem and proposes the first revocable pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA). We should no longer discuss whether to revoke certificates but how to do it effectively, ensuring both the scalability of the revocation operation and the non-repudiation of the signature in the short or long term. Under the computational difficulty assumptions of the modified collusion attack algorithm with traitors (-mCAA) and discrete logarithm (DL) problems, we demonstrate that our scheme is secure against existential unforgeability under chosen message attacks (EUF-IERCBS-kCAA-CMA) in a random oracle model.
View Article and Find Full Text PDFThe identification of ships plays a crucial role in security and managing vessel traffic for ports and onshore facilities. Existing video monitoring systems help visually identify a vessel where other systems are not present or sufficient. Readable vessel plates and hull inscriptions of detected ships in the video stream allow using text location and recognition methods to obtain ships' identification names or numbers.
View Article and Find Full Text PDFShip detection and tracking is a basic task in any vessel traffic monitored area, whether marine or inland. It has a major impact on navigational safety and thus different systems and technologies are used to determine the best possible methods of detecting and identifying sailing units. Video monitoring is present in almost all of them, but it is usually operated manually and is used as a backup system.
View Article and Find Full Text PDF