29.11.2012 Views

Merkle Tree Traversal Techniques - CDC

Merkle Tree Traversal Techniques - CDC

Merkle Tree Traversal Techniques - CDC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Step 6: leaf = 5 .<br />

• ( )<br />

5<br />

Figure 2.6: The tree after round 5.<br />

P n with its authentication path { 0, 1, 2}<br />

{ P( n4) , P( n67) , P( n 03)<br />

} are output.<br />

h<br />

• 2 / leaf + 1 has two solutions so we consider both cases:<br />

23<br />

Auth Auth Auth =<br />

Case 1: h = 0 :<br />

• Auth 0 becomes P( n 7)<br />

, because it is the only value in Stack 0 .<br />

becomes empty. startnode = 6 so we run Stack0 . initialize ( 6,0)<br />

.<br />

Stack 0<br />

• For h = 0 we run 0 . Stack update , which only puts P( n 6)<br />

onto the stack<br />

and stops.<br />

Case 2: h = 1:<br />

Auth becomes ( )<br />

• 1<br />

P n 45 , because it is the only value in 1<br />

becomes empty. startnode = 10 , which is too big, so stop.<br />

So the tree, after the sixth round, looks like the one in figure 2.7:<br />

Stack . Stack 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!