Results 11 to 20 of about 7,578 (241)

Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT [PDF]

open access: yesSensors
Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability ...
Linlin He   +4 more
doaj   +2 more sources

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +3 more sources

The application of hash chains and hash structures to cryptography

open access: green, 2009
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
Tom Page
  +5 more sources

An Ordered Universal Accumulator Based on a Hash Chain [PDF]

open access: goldApplied Sciences
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang   +3 more
doaj   +2 more sources

DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking [PDF]

open access: yesScientific Reports
With the wide application of blockchain comes the challenge of cross-chain interaction. For example, the isolation between the information stored in different blockchains can result in the ”isolated islands of value” effect in blockchains.
Huiying Zou   +4 more
doaj   +2 more sources

Infinite length hash chains and their applications

open access: greenProceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques.
Kemal Biçakcı, Nazife Baykal
openalex   +3 more sources

Research on trusted DNP3-BAE protocol based on hash chain [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2018
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj   +2 more sources

File Data Synchronization Method Based on Ordered Hash Chain [PDF]

open access: yesJisuanji gongcheng, 2023
This study aims to tackle the problems of low efficiency and local update difficulties in the existing file data synchronization transmission methods.To this end, it proposes a Hash chain construction and file data synchronization method.It takes the ...
ZENG Chang, JIANG Wenbao, GUO Yangnan
doaj   +1 more source

Fast Counterfeit RFID Tags Detection With Slot Constraints

open access: yesIEEE Access, 2023
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj   +1 more source

Home - About - Disclaimer - Privacy