TY - GEN
T1 - Short paper: Practically unbounded one-way chains for authentication with backward secrecy
AU - Di Pietro, Roberto
AU - Durante, Antonio
AU - Mancini, Luigi
AU - Patil, Vishwas
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2005/12/1
Y1 - 2005/12/1
N2 - One-way hash chains have been the preferred choice (over symmetric and asymmetric key cryptography) in security setups where efficiency mattered; despite the ephemeral confidentiality and authentication they assure. They only support forward secrecy and have limitations over the chain size (bounded). In this paper, we show how the use of chameleon functions leads to the generation of practically unbounded one-way chains with constant memory storage requirement, providing forward, and backward secrecy as well. Such a cryptographic tool appears to be a great enabler for a variety of applications that could not be efficiently realized earlier. From our experiments we observed that this new kind of one-way chain formation adds a slight computational burden, which is justifiable by the unique advantages provided under our construction. The basic unit of our construction, chameleon function, can be elegantly used to design trees or even simpler star-like constructs. © 2005 IEEE.
AB - One-way hash chains have been the preferred choice (over symmetric and asymmetric key cryptography) in security setups where efficiency mattered; despite the ephemeral confidentiality and authentication they assure. They only support forward secrecy and have limitations over the chain size (bounded). In this paper, we show how the use of chameleon functions leads to the generation of practically unbounded one-way chains with constant memory storage requirement, providing forward, and backward secrecy as well. Such a cryptographic tool appears to be a great enabler for a variety of applications that could not be efficiently realized earlier. From our experiments we observed that this new kind of one-way chain formation adds a slight computational burden, which is justifiable by the unique advantages provided under our construction. The basic unit of our construction, chameleon function, can be elegantly used to design trees or even simpler star-like constructs. © 2005 IEEE.
UR - http://ieeexplore.ieee.org/document/1607596/
UR - http://www.scopus.com/inward/record.url?scp=33847297636&partnerID=8YFLogxK
U2 - 10.1109/SECURECOMM.2005.46
DO - 10.1109/SECURECOMM.2005.46
M3 - Conference contribution
SN - 0769523692
SP - 400
EP - 402
BT - Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
ER -