期刊文献+

一种新颖的可再生多Hash链的构造 被引量:4

A Novel Construction of Re-initializable Multi-Hash Chains
下载PDF
导出
摘要 作为一种能够提供不可否认性的密码学算法,由于计算效率较高,Hash链被广泛应用于电子微支付方案中。为了进一步提高系统的效率,可以同时采用多个Hash链表示不同的面值进行微支付。由于Hash链存在有限长度的限制,系统的设计需要尽量降低再生Hash链时导致的额外开销。该文提出一种高效的基于一次性签名的可同时再生多个Hash链的构造方法,分析了这种构造内在的不可否认性和再生配置的灵活性,讨论了在多面值微支付中的应用。这种构造方法能够提高同时使用多个Hash链的系统的效率。 As a cryptography algorithm that can provide non-repudiability, hash chains are widely used in electronic micropayment schemes because of its efficiency. In order to further improve efficiency, multiple hash chains can be simultaneously used to represent different denominations in micropayment. Because of the limitation that hash chain has a limited length, system design has to reduce the overhead when hash chains are re-initialized. A efficient one-time-signature-based construction is proposed which can simultaneously re-initialize multiple hash chains and its intrinsic non-repudiability and flexibility of configuration in re-initialization are analyzed. The application of the construction in multi-denomination micropayment is illustrated. The proposed construction can improve the efficiency of systems with multiple hash chains.
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第2期299-302,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金重大项目(69931050)资助课题
关键词 HASH链 不可否认性 一次性签名 Hash chain, Non-repudiability, One-time signature
  • 相关文献

参考文献11

  • 1Lamport L.Password authentication with insecure communication.Communications of the ACM,1981,24(11):770-772. 被引量:1
  • 2Rivest R,Shamir A.Payword and MicroMint:two simple micropayment schemes.Proceedings of the 4^th Security Protocols International Workshop(Security Protocols),Lecture Notes in Computer Science,Cambridge,UK,1996,1189:69-87. 被引量:1
  • 3Anderson R,Manifavas H,Sutherland C.NetCard-a practical electronic cash system.Proceedings of the 4^th Security Protocols International Workshop(Security Protocols),Lecture Notes in Computer Science,Cambridge,UK,1996,1189:49-57. 被引量:1
  • 4Pedersen T Electronic payments of small amounts.Proceedings of the 4^th Security Protocols International Workshop(Security Protocols),Lecture Notes in Computer Science,Cambridge,UK,1996,1189:59-68. 被引量:1
  • 5Dai X,Lo B.Netpay-An efficient protocol for micropayments on the WWW.URL:http://ausweb.scu.edu.au/aw99/papers/dai/paper.html 被引量:1
  • 6Diffie W,Hellman M.New directions in cryptography.IEEE Trans.on Information Theory,1976,IT-22(11):644-654. 被引量:1
  • 7Merkle R.A digital signature based on a conventional encryption function.Proceedings of Advances in Cryptology-CRYPTO '87,Lecture Notes in Computer Science,Santa Barbara,CA,USA,1988,vol.293:369-378. 被引量:1
  • 8Bicakci K,Baykal N.Infinite length hash chains and their applications.Proceedings of the llth IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises(WETICE'02),Pittsburgh,USA,June 2002:57-61. 被引量:1
  • 9Goyal V.How to re-initialize a hash chain.URL:http://eprint.iacr.org/2004/097.pdf 被引量:1
  • 10Rivest R.The MD5 message digest algorithm.RFC 1321,April 1992. 被引量:1

同被引文献29

  • 1宁红宙,刘云,何德全.一种用于Ad Hoc网络的分布式证书撤销算法[J].北京交通大学学报,2005,29(2):44-46. 被引量:10
  • 2赵志新,张浩军,杨峰,祝跃飞.一种适用于Ad Hoc网络的高效证书撤销机制[J].计算机应用与软件,2006,23(10):128-130. 被引量:1
  • 3刘忆宁,李宏伟,田金兵.二维hash链在Payword中的应用[J].计算机工程,2006,32(23):34-35. 被引量:3
  • 4Seung Y, Kravets R. MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks[C]//Proc. of the 2nd Annual PKI Research Workshop Program. Gaithersburg, Maryland, USA: [s. n.], 2003. 被引量:1
  • 5Mohamed E, Lamia B, Farouk K. A Totally Distributed Cluster Based Key Management Model for Ad Hoc Networks[C]//Proc. of the 3rd Annual Mediterranean Ad Hoc Networking Workshop. Bodrum, Turkey: IEEE Computer Society, 2004. 被引量:1
  • 6Dong Y. Provding Distributed Certificate Authority Service in Cluster Based Mobile Ad Hoc Networks[J]. Computer Communications, 2007, 30(11): 2442-2452. 被引量:1
  • 7Morogan M, Muftic S. Certificate Management in Ad Hoc Networks[C]//Proc. of Symposium on Applications and the Internet Workshops. Orlando, Florida, USA: IEEE Computer Society, 2003. 被引量:1
  • 8Zerfos P. URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc NetWorks[J]. IEEE/ACM Trans. on Networking, 2004, 12(6): 1049-1063. 被引量:1
  • 9Hong Xiaoyan, Yi Yunjun. A Secure Ad Hoc Routing Approach Using Localized Self-healing Communities[C]//Proc. of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Washington, USA: ACM Press, 2005. 被引量:1
  • 10Nguyen Q. Multi-dimensional Hash Chains and Application to Micropayment Schemes[C]//Proc. of International Workshop on Coding and Cryptography. Bergen, Norway: [s. n.], 2005. 被引量:1

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部