Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1765278.1765286guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Almost optimal hash sequence traversal

Published: 11 March 2002 Publication History

Abstract

We introduce a novel technique for computation of consecutive preimages of hash chains. Whereas traditional techniques have a memory-times-computation complexity of O(n) per output generated, the complexity of our technique is only O(log2n), where n is the length of the chain.
Our solution is based on the same principal amortization principle as [2], and has the same asymptotic behavior as this solution. However, our solution decreases the real complexity by approximately a factor of two. Thus, the computational costs of our solution are approximately 1/2log2 n hash function applications, using only a little more than log2 n storage cells.
A result of independent interest is the lower bounds we provide for the optimal (but to us unknown) solution to the problem we study. The bounds show that our proposed solution is very close to optimal. In particular, we show that there exists no improvement on our scheme that reduces the complexity by more than an approximate factor of two.

References

[1]
G. Itkis and L. Reyzin, "Forward-Secure Signatures with Optimal Signing and Verifying," Crypto '01, pp. 332-354.
[2]
M. Jakobsson, "Fractal Hash Sequence Representation and Traversal," ISIT '02; full paper at www.markus-jakobsson.com.
[3]
M. Jakobsson "Method and Apparatus for Efficient Computation of One-Way Chains in Cryptographic Applications," U.S. Patent Application 09/969, 833.
[4]
L. Lamport, "Constructing Digital Signatures from a One Way Function," SRI International Technical Report CSL-98 (October 1979).
[5]
R. Merkle, "A digital signature based on a conventional encryption function," Proceedings of Crypto '87.
[6]
S. Micali, "Efficient Certificate Revocation," Proceedings of RSA '97, and U.S. Patent No. 5,666,416.
[7]
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and Secure Source Authentication for Multicast," Proceedings of Network and Distributed System Security Symposium NDSS 2001, February 2001.
[8]
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," Proc. of IEEE Security and Privacy Symposium S & P 2000, May 2000.
[9]
A. Perrig, R. Canetti, D. Song, and D. Tygar, "TESLA: Multicast Source Authentication Transform", Proposed IRTF draft, http://pziris.cs.berkeley.edu/~perrig/
[10]
K. S. J. Pister, J. M. Kahn and B. E. Boser, "Smart Dust: Wireless Networks of Millimeter-Scale Sensor Nodes. Highlight Article in 1999 Electronics Research Laboratory Research Summary.", 1999. See http://robotics.eecs.berkeley.edu/~pister/SmartDust/
[11]
FIPS PUB 180-1, "Secure Hash Standard, SHA-1," www.itl.nist.gov/fipspubs/fip180-1.htm
[12]
S. Stubblebine and P. Syverson, "Fair On-line Auctions Without Special Trusted Parties," Financial Cryptography '01.

Cited By

View all
  • (2019)Accommodating Time-Triggered Authentication to FlexRay DemandsProceedings of the Third Central European Cybersecurity Conference10.1145/3360664.3360666(1-6)Online publication date: 14-Nov-2019
  • (2017)Secure producer mobility in information-centric networkProceedings of the 4th ACM Conference on Information-Centric Networking10.1145/3125719.3125725(163-169)Online publication date: 26-Sep-2017
  • (2015)Secure broadcast in distributed networks with strong adversariesSecurity and Communication Networks10.1002/sec.12968:18(3739-3750)Online publication date: 1-Dec-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
FC'02: Proceedings of the 6th international conference on Financial cryptography
March 2002
302 pages
ISBN:354000646X
  • Editor:
  • Matt Blaze

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 11 March 2002

Author Tags

  1. amortization
  2. hash chain
  3. pebbles
  4. upper and lower bounds

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Accommodating Time-Triggered Authentication to FlexRay DemandsProceedings of the Third Central European Cybersecurity Conference10.1145/3360664.3360666(1-6)Online publication date: 14-Nov-2019
  • (2017)Secure producer mobility in information-centric networkProceedings of the 4th ACM Conference on Information-Centric Networking10.1145/3125719.3125725(163-169)Online publication date: 26-Sep-2017
  • (2015)Secure broadcast in distributed networks with strong adversariesSecurity and Communication Networks10.1002/sec.12968:18(3739-3750)Online publication date: 1-Dec-2015
  • (2013)Efficient targeted key subset retrieval in fractal hash sequencesProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516739(1273-1284)Online publication date: 4-Nov-2013
  • (2011)LARKACM Transactions on Embedded Computing Systems10.1145/2043662.204366510:4(1-35)Online publication date: 1-Nov-2011
  • (2010)On fast verification of hash chainsProceedings of the 2010 international conference on Topics in Cryptology10.1007/978-3-642-11925-5_26(382-396)Online publication date: 1-Mar-2010
  • (2009)Single-Layer Fractal Hash Chain Traversal with Almost Optimal ComplexityProceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology10.1007/978-3-642-00862-7_22(325-339)Online publication date: 29-Apr-2009
  • (2008)Concrete Security for Entity RecognitionProceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology10.1007/978-3-540-89754-5_13(158-171)Online publication date: 14-Dec-2008
  • (2007)A secure energy-efficient routing protocol for WSNProceedings of the 5th international conference on Parallel and Distributed Processing and Applications10.5555/2395970.2396013(407-418)Online publication date: 29-Aug-2007
  • (2007)Securing sensor reports in wireless sensor networksProceedings of the 13th international Euro-Par conference on Parallel Processing10.5555/2391541.2391650(881-890)Online publication date: 28-Aug-2007
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media