Fast Verification of Hash Chains with Reduced Storage
SCIE
SCOPUS
- Title
- Fast Verification of Hash Chains with Reduced Storage
- Authors
- Dea Hyun Yum; Jin Seok Kim; Lee, PJ; Hong, SJ
- Date Issued
- 2011-01
- Publisher
- IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
- Abstract
- A hash chain H for a hash function hash(.) is a sequence of hash values < x(n), x(n-1), ..., x(0)>, where x(0) is a secret value, x(i) is generated by x(i) = hash(x(i-1)) for 1 <= i <= n, and x(n) is a public value. Hash values of H are disclosed gradually from x(n-1) to x(0). The correctness of a disclosed hash value x(i) can be verified by checking the equation x(n) =(?) hash(n-i)(x(i)). To speed up the verification, Fischlin introduced a check-bit scheme at CT-RSA 2004. The basic idea of the check-bit scheme is to output some extra information cb, called a check-bit vector, in addition to the public value x(n), which allows each verifier to perform only a fraction of the original work according to his or her own security level. We revisit the Fischlin's check-bit scheme and show that the length of the check-bit vector cb can be reduced nearly by half. The reduced length of cb is close to the theoretic lower bound.
- URI
- https://oasis.postech.ac.kr/handle/2014.oak/25120
- DOI
- 10.1587/TRANSFUN.E94.A.383
- ISSN
- 0916-8508
- Article Type
- Article
- Citation
- IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol. E94A, no. 1, page. 383 - 391, 2011-01
- Files in This Item:
- There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.