Results 11 to 20 of about 32,420 (268)

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +3 more sources

Energy-Efficient Hash Chain Traversal

open access: greenIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n.
Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee
openalex   +4 more sources

Hasq Hash Chains. [PDF]

open access: green, 2014
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Oleg Mazonka, Vlad Popov
openalex   +3 more sources

Individual displacements in hashing with coalesced chains [PDF]

open access: greenCombinatorics, Probability and Computing, 2005
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openalex   +4 more sources

Separate Chaining Meets Compact Hashing [PDF]

open access: green, 2019
Preprint of the local proceedings of the 173th SIGAL ...
Dominik Köppl
openalex   +3 more sources

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: goldSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security.
Mayuresh Sunil Pardeshi   +2 more
openalex   +5 more sources

Efficient Constructions for One-Way Hash Chains [PDF]

open access: green, 2005
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Yih‐Chun Hu   +2 more
openalex   +3 more sources

The application of hash chains and hash structures to cryptography

open access: green, 2009
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
Tom Page
  +5 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Selective Location Blinding Using Hash Chains [PDF]

open access: yes, 2011
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Lenzini, Gabriele   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy