Skip to main content

On The Computation-Storage Trade-Offs of Hash Chain Traversal

  • Conference paper
Financial Cryptography (FC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2742))

Included in the following conference series:

Abstract

We study the problem of traversing a hash chain with a constant bound, m, on the number of hash-function evaluations allowed per each exposed link in the chain. We present a new, general protocol that solves this problem, and prove that its storage requirements are \(k\sqrt[k]{n}\) chain links, where k = m + 1. We propose a new, natural criterion for evaluating the utility of a hash chain traversal protocol, which measures the length of the hash chain that the protocol traverses under fixed storage constraints. We present a new, specific protocol, tailored for the case m = 1, which improves the performance of the general protocol (with respect to the above criterion) by more than twice, and prove that the specific protocol is optimal in that sense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Manifavas, C., Sutherland, C.: NetCard – A Practical Electronic Cash System. In: Proc. of the fourth Cambridge Security Protocols Workshop, Cambridge, UK, pp. 49–57 (1996)

    Google Scholar 

  2. Coppersmith, D., Jakobsson, M.: Almost Optimal Hash Sequence Traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  4. Haller, N.: The S/KEY one-time password system. RFC 1760, Internet Engineering Task Force (February 1995)

    Google Scholar 

  5. Itkis, G., Reyzin, L.: Forward-Secure Signature with Optimal Signing and Verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Jakobsson, M.: Fractal Hash Sequence Representation and Traversal. In: IEEE International Symposium on Information Theory (ISIT 2002), Lausanne, Switzerland (2002)

    Google Scholar 

  7. Kozlov, A., Reyzin, L.: Forward-Secure Signatures with Fast Key Update. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 241–256. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Lamport, L.: Constructing Digital Signatures from a One-way Function. SRI International Technical Report SRI-CSL-98 (October 1979)

    Google Scholar 

  9. Perrig, A., Canetti, R., Song, D., Tygar, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Security and Privacy Symposium, pp. 56–73 (May 2000)

    Google Scholar 

  10. Rivest, R.L., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Proc. of The Fourth Cambridge Security Protocols Workshop, Cambridge, UK, pp. 69– 87 (1996)

    Google Scholar 

  11. Stubblebine, S., Syverson, P.: Fair On-line Auctions without Special Trusted Parties. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, p. 230. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  12. FIPS PUB 180-1, Secure Hash Standard, SHA-1, http://www.itl.nist.gov/fipspubs/fip180-1.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sella, Y. (2003). On The Computation-Storage Trade-Offs of Hash Chain Traversal. In: Wright, R.N. (eds) Financial Cryptography. FC 2003. Lecture Notes in Computer Science, vol 2742. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45126-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45126-6_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40663-1

  • Online ISBN: 978-3-540-45126-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics