Addressing the Shortcomings of One-Way Chains

ثبت نشده
چکیده

One-way hash chains have been the preferred choice, over the symmetric and asymmetric key cryptography, in security setups where efficiency mattered; despite the ephemeral confidentiality and authentication they assure. Known constructions of one-way chains (for example, SHA-1 based), only ensure the forward secrecy and have limitations over their length i.e., a priori knowledge of chain’s length is necessary before constructing it. In this paper, we will see how our approach, based on chameleon functions, leads to the generation of practically unbounded one-way chains with constant storage and computational requirements. We provide the construction and advantages of our proposal with the help of a secure group communication setup. We also provide the implementation details of our construction and argue its suitability for security setups, where one cannot a priori determine the longevity of the setup.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification of Disruptions and Associated Resilience Strategies in Blood Supply Chain Using a New Combined Approach

INTRODUCTION: Supply chains face various disruptions from human-made to natural disasters preventing proper flow of materials and products. This problem is more important in the healthcare supply chains, especially the blood supply chains, in which human lives are at risk. Making the supply chains resilient, recently addressed by managers and researchers, can be a good way to tackle them. This ...

متن کامل

The Real Story of the Fifth Nerve Neurinoma: A Review of Our Learning Curve about Surgical Approaches and Associated Shortcomings

Background and Importance: Our learning curve during two decades of neurosurgical practice has been changed from an abstractive to a more meaningful and conductive state. In cases of fifth nerve neurinoma, pre-operative anatomopathologic diagnosis could lead us to a pre-planned program during and after the surgery to get the safe surgical result. Case Presentation: Representation of two comp...

متن کامل

Applying Stackelberg Game to Find the Best Price and Delivery Time Policies in Competition between Two Supply Chains

In this paper, the competition between two supply chains and their elements is studied. Each chain consisted of a manufacturer and a distributor and the two chains compete in a market with single type of customer sensitive to price and delivery time. Therefore, this is a two-supply chain game and during the competition between two supply chains, elements of each supply chain (manufacturer and/o...

متن کامل

بازخوانی نارسایی اضطراب حدیث، حکم و چگونگی تعامل با آن

In Islam, tradition has a special place for it is the second source of understanding religion after the holy Quran. Muslim scholars use their best endeavours to keep and study traditions, and compose hundreds of books to recognize and understand the contents of traditions and their chains of transmission. Some of the narrations in the hadith sources do possess irregularity in texts or chain. Wh...

متن کامل

A Hybrid Dynamic Programming for Inventory Routing Problem in Collaborative Reverse Supply Chains

Inventory routing problems arise as simultaneous decisions in inventory and routing optimization. In the present study, vendor managed inventory is proposed as a collaborative model for reverse supply chains and the optimization problem is modeled in terms of an inventory routing problem. The studied reverse supply chains include several return generators and recovery centers and one collection...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005