Energy-Efficient Hash Chain Traversal
スポンサーリンク
概要
- 論文の詳細を見る
A hash chain H for a one-way hash function h(·) is a sequence of hash values <v0,v1,...,vn>, where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n. At the outset, T stores carefully chosen κ hash values (including vn) of H in κ memory storages (called pebbles). In round i, T performs two kinds of computations; online computation to output vi with hash values stored in pebbles and then preparatory computation to rearrange pebbles for future rounds. Usually, the online computation consists of either one or zero hash function evaluation, while the preparatory computation occupies most of the computational cost. The design goal of previous hash chain traversal algorithms was to minimize the worst case computational cost per round with minimal pebbles. On the contrary, we study a different optimization problem of minimizing the average case computational cost. Our proposed traversal algorithm reduces the average case computational cost by 20-30% and the online computational cost by 23-33% for parameters of practical interest. For example, if the proposed algorithm is implemented on battery-powered devices, the battery lifetime can be increased by 20-30%.
- 2011-03-01
著者
-
SEO Jae
Department of Electronic and Electrical Engineering, POSTECH
-
Lee Pil
Department Of Electronic And Electrical Engineering
-
Yum Dae
Department Of Electronic And Electrical Engineering
-
Seo Jae
Department Of Electronic And Electrical Engineering
-
Yum Dae
Postech Kyungbuk Kor
-
Lee Pil
Postech Kyungbuk Kor
-
LEE Pil
Department of Creative IT Excellence Engineering and the Department of Electrical Engineering, POSTECH
-
YUM Dae
Department of Electrical Engineering, POSTECH
関連論文
- Generalized Hash Chain Traversal with Selective Output
- Association study of TP53 polymorphisms with lung cancer in a Korean population
- Lack of association of fragile histidine triad (FHIT) polymorphisms with lung cancer in the Korean population
- Visible Laser Action of Dy^ Ions in Monoclinic KY(WO_4)_2 and KGd(WO_4)_2 Crystals under Xe-Flashlamp Pumping
- Security Analysis of Yeh-Tsai Security Mechanism
- IS-60 Fetal hydronephrosis : prenatal diagnosis and postnatal management and outcome
- Efficient Fair Exchange from Identity-Based Signature
- Invisibly Sanitizable Signature without Pairings
- Generalized Hash Chain Traversal with Selective Output
- Generalized Combinatoric Accumulator
- An Efficient Implementation of Two-Term Exponentiation
- Security Analysis of Zhu-Bao's Verifiably Committed Signature(Information Security)
- P-IS-80 The value of matrix metalloproteinase-8 (MMP-8) level of amniotic fluid as a diagnostic tool of maternal chorioamnionitis(Perinatology 3,Group 108,International Session)
- Risk Factors for Development of Paradoxical Response during Anti-Tuberculosis Treatment in HIV-Negative Patients with Pleural Tuberculosis
- Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
- Structural Optimization of High-Power AlGaInP Resonant Cavity Light-Emitting Diodes for Visible Light Communications
- Fast Verification of Hash Chains with Reduced Storage
- Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme(Fundamental Theories for Communications)
- Effect of dehydroepiandrosterone on the lipopolysaccharide-induced interleukin-6 production in canine macrophage cell line (DH-82)(Perinatology 1)
- Energy-Efficient Hash Chain Traversal
- Sanitizable Signatures Reconsidered
- Lightweight One-Time Signature for Short Messages
- Lightweight Distance Bounding Protocol against Relay Attacks
- Security Condition for Exact Localization in Wireless Ad Hoc Networks
- Unilateral Distance Bounding Protocol with Bidirectional Challenges
- Secure and Lightweight Localization Method for Wireless Sensor Networks
- On Discrete Logarithm Based Additively Homomorphic Encryption
- A Remark on " Efficient Revocable ID-Based Encryption with a Public Channel"
- Revocable Identity-Based Encryption with Rejoin Functionality