Presentation 2019-03-08
Authentication with hash chain computation model
Shinta Hirai, Masakazu Soshi,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Due to the spread of IoT devices, the number of devices restricted by memory etc. has increased. In order to securely communicate between these IoT devices, it is sufficient to have $N$ keys when the number of users is $N$. However, in that case, as the number of users increases, the number of necessary keys becomes enormous. Therefore, hash chain aggregation (HCA) was devised by Kurihara cite{HCA_PST} as a way to perform mutual authentication efficiently and lightly. The HCA is a method of assigning multiple hash values to each user and generating a common key using them, and the hash value that each user needs to hold is $O(log N)$ pieces. However, when multiple people collide and attack HCA, it is possible that non-authenticators can calculate common keys between certifiers. In this paper, we first assume the case of two attackers. proposed an improved HCA that reduces such combinations and describe the number of hash values required for common key generation in the improved HCA
Keyword(in Japanese) (See Japanese page)
Keyword(in English) IoT / Authentication / Hash Function / Hash Chain
Paper # ICSS2018-84
Date of Issue 2019-02-28 (ICSS)

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2019/3/7(2days)
Place (in Japanese) (See Japanese page)
Place (in English) NICT Okinawa Electromagnetic Technology Center
Topics (in Japanese) (See Japanese page)
Topics (in English) Security, etc.
Chair Yoshiaki Shiraishi(Kobe Univ.)
Vice Chair Hiroki Takakura(NII) / Katsunari Yoshioka(Yokohama National Univ.)
Secretary Hiroki Takakura(NTT) / Katsunari Yoshioka(NICT)
Assistant Akira Yamada(KDDI labs.) / Keisuke Kito(Mitsubishi Electric)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Authentication with hash chain computation model
Sub Title (in English)
Keyword(1) IoT
Keyword(2) Authentication
Keyword(3) Hash Function
Keyword(4) Hash Chain
1st Author's Name Shinta Hirai
1st Author's Affiliation Hiroshima City University(Hiroshima City Univ.)
2nd Author's Name Masakazu Soshi
2nd Author's Affiliation Hiroshima City University(Hiroshima City Univ.)
Date 2019-03-08
Paper # ICSS2018-84
Volume (vol) vol.118
Number (no) ICSS-486
Page pp.pp.149-153(ICSS),
#Pages 5
Date of Issue 2019-02-28 (ICSS)