B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi
{"title":"A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain","authors":"B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi","doi":"10.1109/CHINACOM.2006.344716","DOIUrl":null,"url":null,"abstract":"In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 First International Conference on Communications and Networking in China","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CHINACOM.2006.344716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.