Generalized Combinatoric Accumulator
The accumulator was introduced as a decentralized alternative to digital signatures. While most of accumulators are based on number theoretic assumptions and require time-consuming modulo exponentiations, Nyberg's combinatoric accumulator dose not depend on any computational assumption and requ...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Information and Systems 2008/05/01, Vol.E91.D(5), pp.1489-1491 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1491 |
---|---|
container_issue | 5 |
container_start_page | 1489 |
container_title | IEICE Transactions on Information and Systems |
container_volume | E91.D |
creator | YUM, Dae Hyun SEO, Jae Woo LEE, Pil Joong |
description | The accumulator was introduced as a decentralized alternative to digital signatures. While most of accumulators are based on number theoretic assumptions and require time-consuming modulo exponentiations, Nyberg's combinatoric accumulator dose not depend on any computational assumption and requires only bit operations and hash function evaluations. In this article, we present a generalization of Nyberg's combinatoric accumulator, which allows a lower false positive rate with the same output length. Our generalization also shows that the Bloom filter can be used as a cryptographic accumulator and moreover excels the Nyberg's accumulator. |
doi_str_mv | 10.1093/ietisy/e91-d.5.1489 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_864404977</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>864404977</sourcerecordid><originalsourceid>FETCH-LOGICAL-c561t-eedd817ca122de0e9400ef20ae3b5056a617262dfb86afa47335c71f6e830aad3</originalsourceid><addsrcrecordid>eNo9kD9PwzAQRy0EEqXwCVg6IDGl9cWxk4xVKQVRiQVm62pfwFX-FDsZyqdvokCnn05674bH2D3wOfBcLBy1LhwXlENk53IOSZZfsAmkiYxAKLhkE56DijIp4mt2E8Kec8hikBP2sKGaPJbul-xs1VQ7V2PbeGdmS2O6qiuH65ZdFVgGuvvbKft8Xn-sXqLt--Z1tdxGRipoIyJrM0gNQhxb4pQnnFMRcySxk1wqVJDGKrbFLlNYYJIKIU0KhaJMcEQrpuxx_HvwzU9HodWVC4bKEmtquqAzlSQ8ydO0J8VIGt-E4KnQB-8q9EcNXA9J9JhE90m01VIPSXrrbbT2ocUvOjvoW2dK0q3HOri60Oveeuqt_x3sM2W-0WuqxQl9DnI4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>864404977</pqid></control><display><type>article</type><title>Generalized Combinatoric Accumulator</title><source>J-STAGE Free</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>YUM, Dae Hyun ; SEO, Jae Woo ; LEE, Pil Joong</creator><creatorcontrib>YUM, Dae Hyun ; SEO, Jae Woo ; LEE, Pil Joong</creatorcontrib><description>The accumulator was introduced as a decentralized alternative to digital signatures. While most of accumulators are based on number theoretic assumptions and require time-consuming modulo exponentiations, Nyberg's combinatoric accumulator dose not depend on any computational assumption and requires only bit operations and hash function evaluations. In this article, we present a generalization of Nyberg's combinatoric accumulator, which allows a lower false positive rate with the same output length. Our generalization also shows that the Bloom filter can be used as a cryptographic accumulator and moreover excels the Nyberg's accumulator.</description><identifier>ISSN: 0916-8532</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1093/ietisy/e91-d.5.1489</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>accumulated hash function ; Accumulators ; Combinatorial analysis ; Cryptography ; Decentralized ; Digital signatures ; Hash based algorithms ; Mathematical analysis ; Mathematical models ; one-way accumulator</subject><ispartof>IEICE Transactions on Information and Systems, 2008/05/01, Vol.E91.D(5), pp.1489-1491</ispartof><rights>2008 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c561t-eedd817ca122de0e9400ef20ae3b5056a617262dfb86afa47335c71f6e830aad3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27902,27903,27904</link.rule.ids></links><search><creatorcontrib>YUM, Dae Hyun</creatorcontrib><creatorcontrib>SEO, Jae Woo</creatorcontrib><creatorcontrib>LEE, Pil Joong</creatorcontrib><title>Generalized Combinatoric Accumulator</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. & Syst.</addtitle><description>The accumulator was introduced as a decentralized alternative to digital signatures. While most of accumulators are based on number theoretic assumptions and require time-consuming modulo exponentiations, Nyberg's combinatoric accumulator dose not depend on any computational assumption and requires only bit operations and hash function evaluations. In this article, we present a generalization of Nyberg's combinatoric accumulator, which allows a lower false positive rate with the same output length. Our generalization also shows that the Bloom filter can be used as a cryptographic accumulator and moreover excels the Nyberg's accumulator.</description><subject>accumulated hash function</subject><subject>Accumulators</subject><subject>Combinatorial analysis</subject><subject>Cryptography</subject><subject>Decentralized</subject><subject>Digital signatures</subject><subject>Hash based algorithms</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>one-way accumulator</subject><issn>0916-8532</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNo9kD9PwzAQRy0EEqXwCVg6IDGl9cWxk4xVKQVRiQVm62pfwFX-FDsZyqdvokCnn05674bH2D3wOfBcLBy1LhwXlENk53IOSZZfsAmkiYxAKLhkE56DijIp4mt2E8Kec8hikBP2sKGaPJbul-xs1VQ7V2PbeGdmS2O6qiuH65ZdFVgGuvvbKft8Xn-sXqLt--Z1tdxGRipoIyJrM0gNQhxb4pQnnFMRcySxk1wqVJDGKrbFLlNYYJIKIU0KhaJMcEQrpuxx_HvwzU9HodWVC4bKEmtquqAzlSQ8ydO0J8VIGt-E4KnQB-8q9EcNXA9J9JhE90m01VIPSXrrbbT2ocUvOjvoW2dK0q3HOri60Oveeuqt_x3sM2W-0WuqxQl9DnI4</recordid><startdate>2008</startdate><enddate>2008</enddate><creator>YUM, Dae Hyun</creator><creator>SEO, Jae Woo</creator><creator>LEE, Pil Joong</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2008</creationdate><title>Generalized Combinatoric Accumulator</title><author>YUM, Dae Hyun ; SEO, Jae Woo ; LEE, Pil Joong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c561t-eedd817ca122de0e9400ef20ae3b5056a617262dfb86afa47335c71f6e830aad3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>accumulated hash function</topic><topic>Accumulators</topic><topic>Combinatorial analysis</topic><topic>Cryptography</topic><topic>Decentralized</topic><topic>Digital signatures</topic><topic>Hash based algorithms</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>one-way accumulator</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>YUM, Dae Hyun</creatorcontrib><creatorcontrib>SEO, Jae Woo</creatorcontrib><creatorcontrib>LEE, Pil Joong</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>YUM, Dae Hyun</au><au>SEO, Jae Woo</au><au>LEE, Pil Joong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Generalized Combinatoric Accumulator</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. & Syst.</addtitle><date>2008</date><risdate>2008</risdate><volume>E91.D</volume><issue>5</issue><spage>1489</spage><epage>1491</epage><pages>1489-1491</pages><issn>0916-8532</issn><eissn>1745-1361</eissn><abstract>The accumulator was introduced as a decentralized alternative to digital signatures. While most of accumulators are based on number theoretic assumptions and require time-consuming modulo exponentiations, Nyberg's combinatoric accumulator dose not depend on any computational assumption and requires only bit operations and hash function evaluations. In this article, we present a generalization of Nyberg's combinatoric accumulator, which allows a lower false positive rate with the same output length. Our generalization also shows that the Bloom filter can be used as a cryptographic accumulator and moreover excels the Nyberg's accumulator.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1093/ietisy/e91-d.5.1489</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8532 |
ispartof | IEICE Transactions on Information and Systems, 2008/05/01, Vol.E91.D(5), pp.1489-1491 |
issn | 0916-8532 1745-1361 |
language | eng |
recordid | cdi_proquest_miscellaneous_864404977 |
source | J-STAGE Free; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | accumulated hash function Accumulators Combinatorial analysis Cryptography Decentralized Digital signatures Hash based algorithms Mathematical analysis Mathematical models one-way accumulator |
title | Generalized Combinatoric Accumulator |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T07%3A13%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Generalized%20Combinatoric%20Accumulator&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=YUM,%20Dae%20Hyun&rft.date=2008&rft.volume=E91.D&rft.issue=5&rft.spage=1489&rft.epage=1491&rft.pages=1489-1491&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1093/ietisy/e91-d.5.1489&rft_dat=%3Cproquest_cross%3E864404977%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=864404977&rft_id=info:pmid/&rfr_iscdi=true |