Journal of Computer Security
Password authentication with insecure communication
Communications of the ACM
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Infinite Length Hash Chains and Their Applications
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
An efficient key predistribution scheme for ad hoc network security
IEEE Journal on Selected Areas in Communications
Controlled delegation protocol in mobile RFID networks
EURASIP Journal on Wireless Communications and Networking
Hi-index | 0.00 |
Hash Chains are widely used in various cryptography applications such as one-time passwords, server-supported signatures and micropayments etc. However, the finite length (‘limited-link') of hash chains limits their applications. Some methods of re-initializing hash chains or infinite hash chains introduced in literatures are inefficient and un-smooth. In this paper, a novel scheme (a new kind of hash chain) is proposed, which re-initializes or updates by itself, named Self-Updating Hash Chain – SUHC. Highlights of SUHC are self-updating, fine-authentication and proactive updating. The updating process of SUHC is smooth, secure and efficient and does not need additional protocols or an independent re-initialization process, and can be continued indefinitely to give rise to an infinite length hash chain. An improved Server-Supported Signature with SUHC is also presented to show the application of SUHC.