Energy-Efficient Hash Chain Traversal

A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round)...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2011/03/01, Vol.E94.A(3), pp.955-963
Hauptverfasser: YUM, Dae Hyun, SEO, Jae Woo, LEE, Pil Joong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 963
container_issue 3
container_start_page 955
container_title IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
container_volume E94.A
creator YUM, Dae Hyun
SEO, Jae Woo
LEE, Pil Joong
description A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n. At the outset, T stores carefully chosen κ hash values (including vn) of H in κ memory storages (called pebbles). In round i, T performs two kinds of computations; online computation to output vi with hash values stored in pebbles and then preparatory computation to rearrange pebbles for future rounds. Usually, the online computation consists of either one or zero hash function evaluation, while the preparatory computation occupies most of the computational cost. The design goal of previous hash chain traversal algorithms was to minimize the worst case computational cost per round with minimal pebbles. On the contrary, we study a different optimization problem of minimizing the average case computational cost. Our proposed traversal algorithm reduces the average case computational cost by 20-30% and the online computational cost by 23-33% for parameters of practical interest. For example, if the proposed algorithm is implemented on battery-powered devices, the battery lifetime can be increased by 20-30%.
doi_str_mv 10.1587/transfun.E94.A.955
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_914634434</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>914634434</sourcerecordid><originalsourceid>FETCH-LOGICAL-c513t-2186207cb056749f0ec12c2188760afe2bb1fd371f1a8b6486111f14c855fce3</originalsourceid><addsrcrecordid>eNpdkD1PwzAURS0EEqXwB5i6IKYEv_gzY1UFCqrE0t1yzHObKnWLnSL132NU6MB0r57uecMh5B5oCUKrpyHakPwhlE3Ny2lZC3FBRqC4KIAxdUlGtAZZaEH1NblJaUMp6Ar4iDw0AePqWDTed67DMEzmNq0ns7XtwmQZ7RfGZPtbcuVtn_DuN8dk-dwsZ_Ni8f7yOpsuCieADUUFWlZUuZYKqXjtKTqoXL5qJan1WLUt-A-mwIPVreRaAuTOnRbCO2Rj8nh6u4-7zwOmwWy75LDvbcDdIZkauGScM56X1Wnp4i6liN7sY7e18WiAmh8j5s-IyUbM1GQjGXo7QZs02BWeERuHzvX4H2HnzPB55NY2GgzsGw5UcDw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>914634434</pqid></control><display><type>article</type><title>Energy-Efficient Hash Chain Traversal</title><source>J-STAGE (Japan Science &amp; Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><creator>YUM, Dae Hyun ; SEO, Jae Woo ; LEE, Pil Joong</creator><creatorcontrib>YUM, Dae Hyun ; SEO, Jae Woo ; LEE, Pil Joong</creatorcontrib><description>A hash chain H for a one-way hash function h(·) is a sequence of hash values &lt;v0,v1,...,vn&gt;, where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n. At the outset, T stores carefully chosen κ hash values (including vn) of H in κ memory storages (called pebbles). In round i, T performs two kinds of computations; online computation to output vi with hash values stored in pebbles and then preparatory computation to rearrange pebbles for future rounds. Usually, the online computation consists of either one or zero hash function evaluation, while the preparatory computation occupies most of the computational cost. The design goal of previous hash chain traversal algorithms was to minimize the worst case computational cost per round with minimal pebbles. On the contrary, we study a different optimization problem of minimizing the average case computational cost. Our proposed traversal algorithm reduces the average case computational cost by 20-30% and the online computational cost by 23-33% for parameters of practical interest. For example, if the proposed algorithm is implemented on battery-powered devices, the battery lifetime can be increased by 20-30%.</description><identifier>ISSN: 0916-8508</identifier><identifier>ISSN: 1745-1337</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.E94.A.955</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Algorithms ; Chains ; Computation ; Computational efficiency ; cryptography ; efficient traversal ; Hash based algorithms ; hash chain ; Mathematical analysis ; On-line systems ; Online</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/03/01, Vol.E94.A(3), pp.955-963</ispartof><rights>2011 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c513t-2186207cb056749f0ec12c2188760afe2bb1fd371f1a8b6486111f14c855fce3</citedby><cites>FETCH-LOGICAL-c513t-2186207cb056749f0ec12c2188760afe2bb1fd371f1a8b6486111f14c855fce3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,1881,4021,27921,27922,27923</link.rule.ids></links><search><creatorcontrib>YUM, Dae Hyun</creatorcontrib><creatorcontrib>SEO, Jae Woo</creatorcontrib><creatorcontrib>LEE, Pil Joong</creatorcontrib><title>Energy-Efficient Hash Chain Traversal</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>A hash chain H for a one-way hash function h(·) is a sequence of hash values &lt;v0,v1,...,vn&gt;, where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n. At the outset, T stores carefully chosen κ hash values (including vn) of H in κ memory storages (called pebbles). In round i, T performs two kinds of computations; online computation to output vi with hash values stored in pebbles and then preparatory computation to rearrange pebbles for future rounds. Usually, the online computation consists of either one or zero hash function evaluation, while the preparatory computation occupies most of the computational cost. The design goal of previous hash chain traversal algorithms was to minimize the worst case computational cost per round with minimal pebbles. On the contrary, we study a different optimization problem of minimizing the average case computational cost. Our proposed traversal algorithm reduces the average case computational cost by 20-30% and the online computational cost by 23-33% for parameters of practical interest. For example, if the proposed algorithm is implemented on battery-powered devices, the battery lifetime can be increased by 20-30%.</description><subject>Algorithms</subject><subject>Chains</subject><subject>Computation</subject><subject>Computational efficiency</subject><subject>cryptography</subject><subject>efficient traversal</subject><subject>Hash based algorithms</subject><subject>hash chain</subject><subject>Mathematical analysis</subject><subject>On-line systems</subject><subject>Online</subject><issn>0916-8508</issn><issn>1745-1337</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkD1PwzAURS0EEqXwB5i6IKYEv_gzY1UFCqrE0t1yzHObKnWLnSL132NU6MB0r57uecMh5B5oCUKrpyHakPwhlE3Ny2lZC3FBRqC4KIAxdUlGtAZZaEH1NblJaUMp6Ar4iDw0AePqWDTed67DMEzmNq0ns7XtwmQZ7RfGZPtbcuVtn_DuN8dk-dwsZ_Ni8f7yOpsuCieADUUFWlZUuZYKqXjtKTqoXL5qJan1WLUt-A-mwIPVreRaAuTOnRbCO2Rj8nh6u4-7zwOmwWy75LDvbcDdIZkauGScM56X1Wnp4i6liN7sY7e18WiAmh8j5s-IyUbM1GQjGXo7QZs02BWeERuHzvX4H2HnzPB55NY2GgzsGw5UcDw</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>YUM, Dae Hyun</creator><creator>SEO, Jae Woo</creator><creator>LEE, Pil Joong</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2011</creationdate><title>Energy-Efficient Hash Chain Traversal</title><author>YUM, Dae Hyun ; SEO, Jae Woo ; LEE, Pil Joong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c513t-2186207cb056749f0ec12c2188760afe2bb1fd371f1a8b6486111f14c855fce3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>Chains</topic><topic>Computation</topic><topic>Computational efficiency</topic><topic>cryptography</topic><topic>efficient traversal</topic><topic>Hash based algorithms</topic><topic>hash chain</topic><topic>Mathematical analysis</topic><topic>On-line systems</topic><topic>Online</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>YUM, Dae Hyun</creatorcontrib><creatorcontrib>SEO, Jae Woo</creatorcontrib><creatorcontrib>LEE, Pil Joong</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>YUM, Dae Hyun</au><au>SEO, Jae Woo</au><au>LEE, Pil Joong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Energy-Efficient Hash Chain Traversal</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2011</date><risdate>2011</risdate><volume>E94.A</volume><issue>3</issue><spage>955</spage><epage>963</epage><pages>955-963</pages><issn>0916-8508</issn><issn>1745-1337</issn><eissn>1745-1337</eissn><abstract>A hash chain H for a one-way hash function h(·) is a sequence of hash values &lt;v0,v1,...,vn&gt;, where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n. At the outset, T stores carefully chosen κ hash values (including vn) of H in κ memory storages (called pebbles). In round i, T performs two kinds of computations; online computation to output vi with hash values stored in pebbles and then preparatory computation to rearrange pebbles for future rounds. Usually, the online computation consists of either one or zero hash function evaluation, while the preparatory computation occupies most of the computational cost. The design goal of previous hash chain traversal algorithms was to minimize the worst case computational cost per round with minimal pebbles. On the contrary, we study a different optimization problem of minimizing the average case computational cost. Our proposed traversal algorithm reduces the average case computational cost by 20-30% and the online computational cost by 23-33% for parameters of practical interest. For example, if the proposed algorithm is implemented on battery-powered devices, the battery lifetime can be increased by 20-30%.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.E94.A.955</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0916-8508
ispartof IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/03/01, Vol.E94.A(3), pp.955-963
issn 0916-8508
1745-1337
1745-1337
language eng
recordid cdi_proquest_miscellaneous_914634434
source J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese
subjects Algorithms
Chains
Computation
Computational efficiency
cryptography
efficient traversal
Hash based algorithms
hash chain
Mathematical analysis
On-line systems
Online
title Energy-Efficient Hash Chain Traversal
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A29%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Energy-Efficient%20Hash%20Chain%20Traversal&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=YUM,%20Dae%20Hyun&rft.date=2011&rft.volume=E94.A&rft.issue=3&rft.spage=955&rft.epage=963&rft.pages=955-963&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.E94.A.955&rft_dat=%3Cproquest_cross%3E914634434%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=914634434&rft_id=info:pmid/&rfr_iscdi=true