Ben Moss
Hash-Tree Anti-Tampering Schemes
Moss, Ben; Ashman, Helen
Authors
Helen Ashman
Abstract
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes. The main problems of constructing such a scheme are its computational feasibility and its candidate reduction process. We show how to solve both problems by the use of secondary hashing over a tree structure. Finally, we give brief comments on our ongoing work in this area.
Citation
Moss, B., & Ashman, H. Hash-Tree Anti-Tampering Schemes. Presented at IEEE International Conference on Information Technology and Applications
Conference Name | IEEE International Conference on Information Technology and Applications |
---|---|
Publication Date | Jan 1, 2002 |
Deposit Date | Nov 14, 2005 |
Publicly Available Date | Oct 9, 2007 |
Peer Reviewed | Peer Reviewed |
Public URL | https://nottingham-repository.worktribe.com/output/1022908 |
Files
final-icita2002-bxm_copy.pdf
(35 Kb)
PDF
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search