[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11912873_40guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Self-Updating hash chains and their implementations

Published: 23 October 2006 Publication History

Abstract

Hash Chains are widely used in various cryptography applications such as one-time passwords, server-supported signatures and micropayments etc. However, the finite length (‘limited-link') of hash chains limits their applications. Some methods of re-initializing hash chains or infinite hash chains introduced in literatures are inefficient and un-smooth. In this paper, a novel scheme (a new kind of hash chain) is proposed, which re-initializes or updates by itself, named Self-Updating Hash Chain – SUHC. Highlights of SUHC are self-updating, fine-authentication and proactive updating. The updating process of SUHC is smooth, secure and efficient and does not need additional protocols or an independent re-initialization process, and can be continued indefinitely to give rise to an infinite length hash chain. An improved Server-Supported Signature with SUHC is also presented to show the application of SUHC.

References

[1]
Lamport L.: Password Authentication with Insecure Communication. Communications of the ACM 24 (11), (1981) 770-772.
[2]
Haller N., Metz C., Nesser P., Straw M.: A One-Time Password System. RFC 2289. (1998) Available from http://www.ietf.org
[3]
Asokan N., Tsudik G., Waidners M.: Server-supported signatures. Journal of Computer Security. (1997)
[4]
Micali S.: Efficient Certificate Revocation. Proceedings of RSA '97. U.S. Patent No. 5, 666, 416.
[5]
Ramkumar M., Memon N.: An Efficient Key Pre-distribution Scheme for MANET Security. IEEE Journal on Selected Areas of Communication. (2005).
[6]
Bicakci K., Baykal N.: Infinite Length Hash Chains and Their Applications. Proceedings of IEEE 11th International Workshops on Enabling Technologies (WETICE2002). (2002).
[7]
Goyal V.: How To Re-initialize a Hash Chain. http://eprint.iacr.org/2004/097.pdf. (2004).
[8]
Lamport L.: Constructing digital signatures from a one way function. Technical Report CSL-98. SRI International. (1979).
[9]
Merkle R.C.: A certified digital signature. In: Brassard G. (ed): Proceedings of the CRYPTO 89. Lecture Notes in Computer Science, Vol. 435. Springer-Verlag, Berlin (1990) 218-238.
[10]
National Institute of Standards and Technology (NIST). Announcing the Secure Hash Standard, FIPS 180-1, U.S. Department of Commerce. (1995).
[11]
National Institute of Standards and Technology (NIST). Announcing the Secure Hash Standard, FIPS 180-2, U.S. Department of Commerce. (2002).
[12]
Asokan N., Tsudik G., Waidners M.: Server-supported signatures. Journal of Computer Security. (1997).
[13]
Ding X., Mazzocchi D., Tsudik G.: Experimenting with Server-Aided Signatures. Network and Distributed Systems Security Symposium (NDSS '02). (2002).
[14]
Oded G.: Foundations of Cryptography: Basic Tools. Cambridge University Press. (2001) 64-74.

Cited By

View all
  • (2020)An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile DevicesWireless Communications & Mobile Computing10.1155/2020/88886792020Online publication date: 18-Dec-2020
  • (2016)A Secure Data Aggregation Approach in Hierarchical Wireless Sensor NetworksProceedings of the 10th International Conference on Ubiquitous Information Management and Communication10.1145/2857546.2857637(1-7)Online publication date: 4-Jan-2016
  • (2010)Controlled delegation protocol in mobile RFID networksEURASIP Journal on Wireless Communications and Networking10.1155/2010/1701502010(1-13)Online publication date: 1-Apr-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
WISE'06: Proceedings of the 7th international conference on Web Information Systems
October 2006
562 pages
ISBN:3540481052
  • Editors:
  • Karl Aberer,
  • Zhiyong Peng,
  • Elke A. Rundensteiner,
  • Yanchun Zhang,
  • Xuhui Li

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 23 October 2006

Author Tags

  1. authentication
  2. hash chain
  3. server-supported signature
  4. updating

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile DevicesWireless Communications & Mobile Computing10.1155/2020/88886792020Online publication date: 18-Dec-2020
  • (2016)A Secure Data Aggregation Approach in Hierarchical Wireless Sensor NetworksProceedings of the 10th International Conference on Ubiquitous Information Management and Communication10.1145/2857546.2857637(1-7)Online publication date: 4-Jan-2016
  • (2010)Controlled delegation protocol in mobile RFID networksEURASIP Journal on Wireless Communications and Networking10.1155/2010/1701502010(1-13)Online publication date: 1-Apr-2010

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media