B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi
{"title":"一种通过哈希链提供认证的概率签名方案","authors":"B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi","doi":"10.1109/CHINACOM.2006.344716","DOIUrl":null,"url":null,"abstract":"In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain\",\"authors\":\"B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi\",\"doi\":\"10.1109/CHINACOM.2006.344716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.\",\"PeriodicalId\":408368,\"journal\":{\"name\":\"2006 First International Conference on Communications and Networking in China\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 First International Conference on Communications and Networking in China\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CHINACOM.2006.344716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 First International Conference on Communications and Networking in China","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CHINACOM.2006.344716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain
In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.