A New Self-Updating Hash Chain Structure Scheme

Self-Updating Hash Chain can be used extensively in many fields, such as one time password(OTP), signatures and authentication etc. In this paper, we propose a new self-updating hash chain based linear partition-combination algorithm (LPCA), which can share data into m parts and any part can’ t leak any information of data s. At a each exchange process, one part of s is transferred. When servers receive k(k≪m parts of s, servers can reconstruct s, the root of a new hash chain is created. Analysis are given to illustrate the Structure Scheme is secure and efficient.

[1]  Haojun Zhang,et al.  An efficient authentication scheme based on the self-updating hash chain for campus network , 2008, 2008 IEEE International Symposium on IT in Medicine and Education.

[2]  Li Chen,et al.  Authentication and Micropayment Protocols based on Self-Updating Hash Chains , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).

[3]  Ma Jian-feng LPCA——data distribution algorithm in distributed storage , 2007 .

[4]  Vipul Goyal,et al.  How To Re-initialize a Hash Chain , 2004, IACR Cryptol. ePrint Arch..

[5]  Haojun Zhang,et al.  A Novel Self-Renewal Hash Chain and Its Implementation , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[6]  Sugata Sanyal,et al.  The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[7]  S.M. Safavi,et al.  A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain , 2006, 2006 First International Conference on Communications and Networking in China.

[8]  Li Chen,et al.  A novel micro-payment scheme for M-commerce based on self-renewal hash chains , 2007, 2007 International Conference on Communications, Circuits and Systems.

[9]  Kemal Bicakci,et al.  Infinite length hash chains and their applications , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[10]  D. Lee,et al.  Hash Function Vulnerability Index and Hash Chain Attacks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.

[11]  Zongkai Yang,et al.  A New Fair Micropayment System Based on Hash Chain , 2004, EEE.

[12]  Yang Zongkai,et al.  A new fair micropayment system based on hash chain , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.