An online algorithm for generating fractal hash chains applied to digital chains of custody
نویسندگان
چکیده
This paper gives an online algorithm for generating Jakobsson’s fractal hash chains [14]. Our new algorithm compliments Jakobsson’s fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is precomputed and a particular list of ⌈logn⌉ hash elements or pebbles are saved. Our online algorithm for hash chain traversal incrementally generates a hash chain of n hash elements without knowledge of n before it starts. For any n, our algorithm stores only the ⌈logn⌉ pebbles which are precisely the inputs for Jakobsson’s amortized hash chain preimage traversal algorithm. This compact representation is useful to generate, traverse, and store a number of large digital hash chains on a small and constrained device. We also give an application using both Jakobsson’s and our new algorithm applied to digital chains of custody for validating dynamically changing forensics data.
منابع مشابه
An efficient Imperialistic Competitive Algorithm for the closed-loop supply chains considering pricing for product, and fleet of heterogeneous vehicles
This paper investigates a pricing multi-period, closed-loop supply chains (CLSCs) with two echelons of producers and customers. Products are delivered to customers might be defective which are picked up and gathered in the collection center and will be fixed if it is possible and will be returned to the chain. Otherwise, they are sold as waste. This problem is determining price and distributio...
متن کاملEfficient Constructions for One-Way Hash Chains
One-way chains are an important cryptographic primitive in many security applications. As one-way chains are very efficient to verify, they recently became increasingly popular for designing security protocols for resource-constrained mobile devices and sensor networks, as their low-powered processors can compute a one-way function within milliseconds, but would require tens of seconds or up to...
متن کاملEfficient Constructions for One-way Hash Chains1
One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one-time signatures, for packet authentication, etc. As one...
متن کاملThe number of maximal matchings in polyphenylene chains
A matching is maximal if no other matching contains it as a proper subset. Maximal matchings model phenomena across many disciplines, including applications within chemistry. In this paper, we study maximal matchings in an important class of chemical compounds: polyphenylenes. In particular, we determine the extremal polyphenylene chains in regards to the number of maximal matchings. We also de...
متن کاملSimultaneous Decentralized Competitive Supply Chain Network Design under Oligopoly Competition
This paper discusses a problem in which decentralized supply chains enter the market simultaneously with no existing rival chains, shape the supply chains’ networks, and set wholesale and retail prices in a noncooperative manner. All the chains produce either identical or highly substitutable products. Customer demand is elastic and price-dependent. A three-step algorithm is proposed to solve ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0705.2876 شماره
صفحات -
تاریخ انتشار 2007