29.11.2012 Views

Merkle Tree Traversal Techniques - CDC

Merkle Tree Traversal Techniques - CDC

Merkle Tree Traversal Techniques - CDC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• For h = 0 we run 0 . Stack update , which only computes P( n 5)<br />

, puts it<br />

onto the stack and stops. For h = 1 we run 1 . Stack update , which removes<br />

the previous two values from the stack, computes P( n 67)<br />

and puts it onto<br />

the stack.<br />

So the tree after the third round looks like the one in figure 2.4:<br />

Step 4: leaf = 3.<br />

• ( )<br />

3<br />

Figure 2.4: The tree after round 3.<br />

P n with its authentication path { 0, 1, 2}<br />

{ P( n2) , P( n01) , P( n 47)<br />

} are output.<br />

h<br />

• 2 / leaf + 1 has three solutions so we consider three cases:<br />

21<br />

Auth Auth Auth =<br />

Case 1: h = 0 :<br />

• Auth 0 becomes P( n 5)<br />

, because it is the only value in Stack 0 .<br />

becomes empty. startnode = 4 so we run Stack0 . initialize ( 4,0)<br />

.<br />

Stack 0<br />

• For h = 0 we run 0 . Stack update , which only puts P( n 4)<br />

onto the stack<br />

and then stops.<br />

Case 2: h = 1:<br />

Auth becomes P( n 67)<br />

, because it is the only value in 1<br />

becomes empty. startnode = 4 so we run Stack1 . initialize ( 4,1)<br />

.<br />

h = we run 1 . Stack update two times. First it computes ( 4)<br />

puts it onto the stack, then it puts P( n 5)<br />

onto the stack and stops.<br />

• 1<br />

• For 1<br />

Case 3: h = 2 :<br />

Stack . Stack 1<br />

P n and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!