Results 11 to 20 of about 70,639 (257)

Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT [PDF]

open access: yesSensors
Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability ...
Linlin He   +4 more
doaj   +2 more sources

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard [PDF]

open access: goldApplied Sciences, 2020
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability ...
Dohoon Kim   +4 more
doaj   +2 more sources

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +3 more sources

DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking [PDF]

open access: yesScientific Reports
With the wide application of blockchain comes the challenge of cross-chain interaction. For example, the isolation between the information stored in different blockchains can result in the ”isolated islands of value” effect in blockchains.
Huiying Zou   +4 more
doaj   +2 more sources

Infinite length hash chains and their applications

open access: greenProceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques.
Kemal Biçakcı, Nazife Baykal
openalex   +3 more sources

Separate Chaining Meets Compact Hashing [PDF]

open access: green, 2019
Preprint of the local proceedings of the 173th SIGAL ...
Dominik Köppl
openalex   +3 more sources

Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [PDF]

open access: yesSensors, 2014
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj   +2 more sources

Research on trusted DNP3-BAE protocol based on hash chain [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2018
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj   +2 more sources

An online algorithm for generating fractal hash chains applied to digital chains of custody [PDF]

open access: green, 2007
This paper gives an online algorithm for generating Jakobsson's fractal hash chains. Our new algorithm compliments Jakobsson's fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is precomputed and a particular list of Ceiling(log n) hash elements or pebbles are saved.
Phillip G. Bradford, Daniel A. Ray
openalex   +3 more sources

Home - About - Disclaimer - Privacy