Trusted computing and communications have gradually become an important part of e-business and e-government, including various distributed systems, network applications, and computer resources. The concept of trusted computing is to prevent damages by software and/or hardware attacks on the PC platform. As network-based and resource-constricted environments become more and more popular, in this paper, it is imperative to design secure and lightweight communication schemes to resist all possible attacks and threats. We integrated the concept of one-time signature and hash-chain into the scheme and thus the network-based communications can resist all the possible attacks and provide good security properties such as unforgeability and verifiability.