Results 1 to 10 of about 70,639 (257)
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi +2 more
doaj +7 more sources
An Ordered Universal Accumulator Based on a Hash Chain [PDF]
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang +3 more
doaj +3 more sources
A Secure Communication Method Based on Message Hash Chain [PDF]
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj +2 more sources
Individual displacements in hashing with coalesced chains [PDF]
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openalex +4 more sources
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Oleg Mazonka, Vlad Popov
openalex +3 more sources
Hash-chain-based authentication for IoT
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj +3 more sources
Energy-Efficient Hash Chain Traversal
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n.
Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee
openalex +4 more sources
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains [PDF]
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +2 more sources
The application of hash chains and hash structures to cryptography
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
Tom Page
+5 more sources
Efficient Constructions for One-Way Hash Chains [PDF]
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Yih‐Chun Hu +2 more
openalex +3 more sources

