Skip to main content

Self-Updating Hash Chains and Their Implementations

  • Conference paper
Web Information Systems – WISE 2006 (WISE 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4255))

Included in the following conference series:

Abstract

Hash Chains are widely used in various cryptography applications such as one-time passwords, server-supported signatures and micropayments etc. However, the finite length (‘limited-link’) of hash chains limits their applications. Some methods of re-initializing hash chains or infinite hash chains introduced in literatures are inefficient and un-smooth. In this paper, a novel scheme (a new kind of hash chain) is proposed, which re-initializes or updates by itself, named Self-Updating Hash Chain – SUHC. Highlights of SUHC are self-updating, fine-authentication and proactive updating. The updating process of SUHC is smooth, secure and efficient and does not need additional protocols or an independent re-initialization process, and can be continued indefinitely to give rise to an infinite length hash chain. An improved Server-Supported Signature with SUHC is also presented to show the application of SUHC.

Research supported by the NNSF of China (No. 90204015, 60473021); the Key Technologies R&D Program of Henan Province of China (No. 0524220044, 062426001); the S&R Found of HAUT of China (No. 0401009, 050211,050215,050216).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  2. Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System. RFC 2289 (1998), Available from: http://www.ietf.org

  3. Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security (1997)

    Google Scholar 

  4. Micali, S.: Efficient Certificate Revocation. In: Proceedings of RSA 1997, U.S. Patent No. 5,666,416 (1997)

    Google Scholar 

  5. Ramkumar, M., Memon, N.: An Efficient Key Pre-distribution Scheme for MANET Security. IEEE Journal on Selected Areas of Communication (2005)

    Google Scholar 

  6. Bicakci, K., Baykal, N.: Infinite Length Hash Chains and Their Applications. In: Proceedings of IEEE 11th International Workshops on Enabling Technologies (WETICE 2002) (2002)

    Google Scholar 

  7. Goyal, V.: How To Re-initialize a Hash Chain (2004), http://eprint.iacr.org/2004/097.pdf

  8. Lamport, L.: Constructing digital signatures from a one way function. Technical Report CSL-98. SRI International (1979)

    Google Scholar 

  9. Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  10. National Institute of Standards and Technology (NIST). Announcing the Secure Hash Standard, FIPS 180-1, U.S. Department of Commerce (1995)

    Google Scholar 

  11. National Institute of Standards and Technology (NIST). Announcing the Secure Hash Standard, FIPS 180-2, U.S. Department of Commerce (2002)

    Google Scholar 

  12. Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security (1997)

    Google Scholar 

  13. Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: Network and Distributed Systems Security Symposium (NDSS 2002) (2002)

    Google Scholar 

  14. Oded, G.: Foundations of Cryptography: Basic Tools, pp. 64–74. Cambridge University Press, Cambridge (2001)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, H., Zhu, Y. (2006). Self-Updating Hash Chains and Their Implementations. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds) Web Information Systems – WISE 2006. WISE 2006. Lecture Notes in Computer Science, vol 4255. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11912873_40

Download citation

  • DOI: https://doi.org/10.1007/11912873_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48105-8

  • Online ISBN: 978-3-540-48107-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics