A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. [PDF]
Hakeem SAA, El-Kader SMA, Kim H.
europepmc +3 more sources
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT [PDF]
Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability ...
Linlin He +4 more
doaj +2 more sources
An Ordered Universal Accumulator Based on a Hash Chain [PDF]
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang +3 more
doaj +2 more sources
Infinite length hash chains and their applications [PDF]
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques.
Bicakci, K, Baykal, Nazife
openaire +3 more sources
Tamper-proof strategy of dynamic hash chain for smart grid cloud storage based on reinforcement learning key update mechanism [PDF]
Cloud storage systems in smart grids face dual challenges: ensuring data integrity while maintaining real-time responsiveness when managing large-scale power data.
Bo Feng +5 more
doaj +2 more sources
File Data Synchronization Method Based on Ordered Hash Chain [PDF]
This study aims to tackle the problems of low efficiency and local update difficulties in the existing file data synchronization transmission methods.To this end, it proposes a Hash chain construction and file data synchronization method.It takes the ...
ZENG Chang, JIANG Wenbao, GUO Yangnan
doaj +1 more source
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains
Yoshio Yatani +2 more
openaire +2 more sources
Fast Counterfeit RFID Tags Detection With Slot Constraints
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj +1 more source
P/Key: PUF based second factor authentication.
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj +2 more sources
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source

