Politecnico di Torino
Authentication is one of the most important security objectives. The use of one-way chains in authentication was proved to be a very successful technique which encountered applications even in constrained environments such as ah-hoc sensor networks. This paper surveys some of the most efficient construction techniques for one-way chains and some of the most prominent authentication protocols that can be built on them. In brief, the construction techniques for one-way chains are categorized in two classes: one-way chains constructed from symmetric primitives and one-way chains constructed from asymmetric primitives.