Construction Techniques for One-Way Chains and Their Use in Authentication

Download Now
Provided by: Politecnico di Torino
Topic: Security
Format: PDF
Authentication is one of the most important security objectives. The use of one-way chains in authentication was proved to be a very successful technique which encountered applications even in constrained environments such as ah-hoc sensor networks. This paper surveys some of the most efficient construction techniques for one-way chains and some of the most prominent authentication protocols that can be built on them. In brief, the construction techniques for one-way chains are categorized in two classes: one-way chains constructed from symmetric primitives and one-way chains constructed from asymmetric primitives.
Download Now

Find By Topic