Results 1 to 10 of about 66,576 (192)

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: yesSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi   +2 more
doaj   +5 more sources

DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking [PDF]

open access: goldScientific Reports
With the wide application of blockchain comes the challenge of cross-chain interaction. For example, the isolation between the information stored in different blockchains can result in the ”isolated islands of value” effect in blockchains.
Huiying Zou   +4 more
doaj   +3 more sources

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: diamondIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +4 more sources

Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [PDF]

open access: goldSensors, 2014
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj   +4 more sources

An Ordered Universal Accumulator Based on a Hash Chain

open access: goldApplied Sciences
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang   +3 more
doaj   +3 more sources

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]

open access: green, 2008
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth   +3 more
core   +4 more sources

Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs [PDF]

open access: goldApplied Sciences, 2020
With the increasing demand for intelligent traffic management and road network intelligent information services, the vehicular ad hoc networks (VANETs) combined with information of air, space and ground have outstanding advantages in coverage, reliable ...
Gege Luo   +3 more
doaj   +2 more sources

Efficient Constructions for One-way Hash Chains [PDF]

open access: green, 2003
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Yih‐Chun Hu   +2 more
openalex   +4 more sources

Individual displacements in hashing with coalesced chains [PDF]

open access: greenCombinatorics, Probability and Computing, 2005
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openalex   +5 more sources

Selective Location Blinding Using Hash Chains [PDF]

open access: green, 2011
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Gabriele Lenzini, Sjouke Mauw, Jun Pang
openalex   +5 more sources

Home - About - Disclaimer - Privacy