DocumentCode :
2198184
Title :
Infinite length hash chains and their applications
Author :
Bicakci, Kemal ; Baykal, Nazife
Author_Institution :
Informatics Inst., Middle East Tech. Univ., Ankara, Turkey
fYear :
2002
fDate :
2002
Firstpage :
57
Lastpage :
61
Abstract :
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques. One of its distinguishing features is that communication and computation overhead of restarting of the system is avoided For the owner of the chain it is possible to go in either way in the chain at any time without any restriction in the chain length, but others see no difference as the functionality it provides with respect to traditional hash chains. On the other hand the drawback here is the increased computation cost due to public-key operations. Part of our work would be considered as one additional step after traditional one-time passwords in the natural progression from fixed password schemes to challenge-response identification protocols.
Keywords :
message authentication; public key cryptography; challenge response identification protocols; communication overhead; computation overhead; cryptography; infinite length hash chains; micropayments; one-time passwords; public key techniques; restarting; server-supported signatures; Application software; Authentication; Computational efficiency; Cryptography; Digital signatures; Electronic commerce; Home computing; Informatics; Protocols; Public key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on
ISSN :
1080-1383
Print_ISBN :
0-7695-1748-X
Type :
conf
DOI :
10.1109/ENABL.2002.1029989
Filename :
1029989
Link To Document :
بازگشت