Merkle Tree Traversal Techniques - CDC
Merkle Tree Traversal Techniques - CDC
Merkle Tree Traversal Techniques - CDC
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
• For h = 0 we run 0 . Stack update , which only computes P( n 5)<br />
, puts it<br />
onto the stack and stops. For h = 1 we run 1 . Stack update , which removes<br />
the previous two values from the stack, computes P( n 67)<br />
and puts it onto<br />
the stack.<br />
So the tree after the third round looks like the one in figure 2.4:<br />
Step 4: leaf = 3.<br />
• ( )<br />
3<br />
Figure 2.4: The tree after round 3.<br />
P n with its authentication path { 0, 1, 2}<br />
{ P( n2) , P( n01) , P( n 47)<br />
} are output.<br />
h<br />
• 2 / leaf + 1 has three solutions so we consider three cases:<br />
21<br />
Auth Auth Auth =<br />
Case 1: h = 0 :<br />
• Auth 0 becomes P( n 5)<br />
, because it is the only value in Stack 0 .<br />
becomes empty. startnode = 4 so we run Stack0 . initialize ( 4,0)<br />
.<br />
Stack 0<br />
• For h = 0 we run 0 . Stack update , which only puts P( n 4)<br />
onto the stack<br />
and then stops.<br />
Case 2: h = 1:<br />
Auth becomes P( n 67)<br />
, because it is the only value in 1<br />
becomes empty. startnode = 4 so we run Stack1 . initialize ( 4,1)<br />
.<br />
h = we run 1 . Stack update two times. First it computes ( 4)<br />
puts it onto the stack, then it puts P( n 5)<br />
onto the stack and stops.<br />
• 1<br />
• For 1<br />
Case 3: h = 2 :<br />
Stack . Stack 1<br />
P n and