Open Access System for Information Sharing

Login Library

 

Article
Cited 1 time in webofscience Cited 1 time in scopus
Metadata Downloads

Fast Verification of Hash Chains with Reduced Storage SCIE SCOPUS

Title
Fast Verification of Hash Chains with Reduced Storage
Authors
Dea Hyun YumJin Seok KimLee, PJHong, SJ
Date Issued
2011-01
Publisher
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
Abstract
A hash chain H for a hash function hash(.) is a sequence of hash values < x(n), x(n-1), ..., x(0)>, where x(0) is a secret value, x(i) is generated by x(i) = hash(x(i-1)) for 1 <= i <= n, and x(n) is a public value. Hash values of H are disclosed gradually from x(n-1) to x(0). The correctness of a disclosed hash value x(i) can be verified by checking the equation x(n) =(?) hash(n-i)(x(i)). To speed up the verification, Fischlin introduced a check-bit scheme at CT-RSA 2004. The basic idea of the check-bit scheme is to output some extra information cb, called a check-bit vector, in addition to the public value x(n), which allows each verifier to perform only a fraction of the original work according to his or her own security level. We revisit the Fischlin's check-bit scheme and show that the length of the check-bit vector cb can be reduced nearly by half. The reduced length of cb is close to the theoretic lower bound.
URI
https://oasis.postech.ac.kr/handle/2014.oak/25120
DOI
10.1587/TRANSFUN.E94.A.383
ISSN
0916-8508
Article Type
Article
Citation
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol. E94A, no. 1, page. 383 - 391, 2011-01
Files in This Item:
There are no files associated with this item.

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

홍성제HONG, SUNG JE
Div of IT Convergence Enginrg
Read more

Views & Downloads

Browse