Journal on Communications ›› 2013, Vol. 34 ›› Issue (4): 70-81.doi: 10.3969/j.issn.1000-436x.2013.04.008

• Academic paper • Previous Articles     Next Articles

Novel self-renewal hash chain scheme based on (t,n) threshold and division tree

Hai-ping HUANG1,2,4,Ting DAI1,2,Ru-chuan WANG1,2,3,Xiao-lin QIN4,Jiu-tian CHEN1   

  1. 1 College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
    2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210003,China
    3 Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education,Nanjing 210003,China
    4 College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China
  • Online:2013-04-25 Published:2017-07-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;Scientific & Technological Support Project (Industry) of Jiangsu Province;The Natural Science Key Fund for Colleges and Universities of Jiangsu Province;Postdoctoral Foundation of China;Postdoctoral Foundation of Jiangsu Province;Science & Technology Innovation Fund for Higher Educat Institutions of Jiangsu Province;The Priority Academic Program Development of Jiangsu Higher Education Institutions;The Priority Academic Program Development of Jiangsu Higher Education Institutions

Abstract:

The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition,division and division-tree was proposed,and then a novel self-renewable hash chain construction scheme was put forward based on division and (,t n)-Mignotte's threshold Chinese remainder theorem secret sharing scheme.From three aspects of key space,twice authent ion and provable security,it theoretically proves that the proposed hash scheme could ensure the novel seed value regenerated safely and resisting the middle-man attack effectively.Simulation experiments demonstrate that the novel scheme obtains equal or more satisfactory performances on the costs of communication,computation and storage than typical schemes.

Key words: division-tree, renewal hash chain, (t,n )-Mignotte's threshold, Chinese remainder theorem

No Suggested Reading articles found!