Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions

  • Sebastian Bittl
  • Published 2014 in
    2014 11th International Conference on Security…

Abstract

One-way hash chains have been used to secure many applications over the last three decades. To overcome the fixed length limitation of first generation designs, so-called infinite length hash chains have been introduced. Such designs typically employ methods of asynchronous cryptography or hash based message authentication codes. However, none of the… (More)

Topics

3 Figures and Tables

Cite this paper

@article{Bittl2014EfficientCO, title={Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions}, author={Sebastian Bittl}, journal={2014 11th International Conference on Security and Cryptography (SECRYPT)}, year={2014}, pages={1-8} }