Infinite length hash chains and their applications

K. Bicakci, N. Baykal

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

40 Citations (Scopus)

Abstract

Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques. One of its distinguishing features is that communication and computation overhead of restarting of the system is avoided For the owner of the chain it is possible to go in either way in the chain at any time without any restriction in the chain length, but others see no difference as the functionality it provides with respect to traditional hash chains. On the other hand the drawback here is the increased computation cost due to public-key operations. Part of our work would be considered as one additional step after traditional one-time passwords in the natural progression from fixed password schemes to challenge-response identification protocols.

Original languageEnglish
Title of host publicationProceedings - 11th IEEE International Workshops on Enabling Technologies
Subtitle of host publicationInfrastructure for Collaborative Enterprises, WET ICE 2002
PublisherIEEE Computer Society
Pages57-61
Number of pages5
ISBN (Electronic)076951748X
DOIs
Publication statusPublished - 2002
Externally publishedYes
Event11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2002 - Pittsburgh, United States
Duration: 10 Jun 200212 Jun 2002

Publication series

NameProceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
Volume2002-January
ISSN (Print)1524-4547

Conference

Conference11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2002
Country/TerritoryUnited States
CityPittsburgh
Period10/06/0212/06/02

Bibliographical note

Publisher Copyright:
© 2002 IEEE.

Keywords

  • Application software
  • Authentication
  • Computational efficiency
  • Cryptography
  • Digital signatures
  • Electronic commerce
  • Home computing
  • Informatics
  • Protocols
  • Public key

Fingerprint

Dive into the research topics of 'Infinite length hash chains and their applications'. Together they form a unique fingerprint.

Cite this