Abstract
Hash Chains are widely used in various cryptography applications such as one-time passwords, server-supported signatures and micropayments etc. However, the finite length (‘limited-link’) of hash chains limits their applications. Some methods of re-initializing hash chains or infinite hash chains introduced in literatures are inefficient and un-smooth. In this paper, a novel scheme (a new kind of hash chain) is proposed, which re-initializes or updates by itself, named Self-Updating Hash Chain – SUHC. Highlights of SUHC are self-updating, fine-authentication and proactive updating. The updating process of SUHC is smooth, secure and efficient and does not need additional protocols or an independent re-initialization process, and can be continued indefinitely to give rise to an infinite length hash chain. An improved Server-Supported Signature with SUHC is also presented to show the application of SUHC.
Research supported by the NNSF of China (No. 90204015, 60473021); the Key Technologies R&D Program of Henan Province of China (No. 0524220044, 062426001); the S&R Found of HAUT of China (No. 0401009, 050211,050215,050216).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)
Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System. RFC 2289 (1998), Available from: http://www.ietf.org
Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security (1997)
Micali, S.: Efficient Certificate Revocation. In: Proceedings of RSA 1997, U.S. Patent No. 5,666,416 (1997)
Ramkumar, M., Memon, N.: An Efficient Key Pre-distribution Scheme for MANET Security. IEEE Journal on Selected Areas of Communication (2005)
Bicakci, K., Baykal, N.: Infinite Length Hash Chains and Their Applications. In: Proceedings of IEEE 11th International Workshops on Enabling Technologies (WETICE 2002) (2002)
Goyal, V.: How To Re-initialize a Hash Chain (2004), http://eprint.iacr.org/2004/097.pdf
Lamport, L.: Constructing digital signatures from a one way function. Technical Report CSL-98. SRI International (1979)
Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
National Institute of Standards and Technology (NIST). Announcing the Secure Hash Standard, FIPS 180-1, U.S. Department of Commerce (1995)
National Institute of Standards and Technology (NIST). Announcing the Secure Hash Standard, FIPS 180-2, U.S. Department of Commerce (2002)
Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security (1997)
Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: Network and Distributed Systems Security Symposium (NDSS 2002) (2002)
Oded, G.: Foundations of Cryptography: Basic Tools, pp. 64–74. Cambridge University Press, Cambridge (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, H., Zhu, Y. (2006). Self-Updating Hash Chains and Their Implementations. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds) Web Information Systems – WISE 2006. WISE 2006. Lecture Notes in Computer Science, vol 4255. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11912873_40
Download citation
DOI: https://doi.org/10.1007/11912873_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48105-8
Online ISBN: 978-3-540-48107-2
eBook Packages: Computer ScienceComputer Science (R0)