K. Bicakci, N. Baykal
authentication, digital signatures, hash functions, hash chains, electronic commerce, network security.
Hash Chains are used extensively in various cryptography applications such as one-time passwords, server supported signatures and micropayments. In this paper, we present a method, called Infinite Length Hash Chains to improve the efficiency and flexibility of this chaining idea by using public-key techniques. One of its distinguishing features is that communication and computation overhead of restarting of the system is avoided. For the owner of the chain it is possible to go in either way in the chain at any time without any restriction in the chain length, but others see no difference as the functionality it provides with respect to traditional hash chains. Part of our work would be considered as one additional step after traditional one-time passwords in the natural progression from fixed password schemes to challenge-response identification protocols.
Important Links:
Go Back