Merkle Tree Traversal Techniques - CDC
Merkle Tree Traversal Techniques - CDC
Merkle Tree Traversal Techniques - CDC
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Step 6: leaf = 5 .<br />
• ( )<br />
5<br />
Figure 2.6: The tree after round 5.<br />
P n with its authentication path { 0, 1, 2}<br />
{ P( n4) , P( n67) , P( n 03)<br />
} are output.<br />
h<br />
• 2 / leaf + 1 has two solutions so we consider both cases:<br />
23<br />
Auth Auth Auth =<br />
Case 1: h = 0 :<br />
• Auth 0 becomes P( n 7)<br />
, because it is the only value in Stack 0 .<br />
becomes empty. startnode = 6 so we run Stack0 . initialize ( 6,0)<br />
.<br />
Stack 0<br />
• For h = 0 we run 0 . Stack update , which only puts P( n 6)<br />
onto the stack<br />
and stops.<br />
Case 2: h = 1:<br />
Auth becomes ( )<br />
• 1<br />
P n 45 , because it is the only value in 1<br />
becomes empty. startnode = 10 , which is too big, so stop.<br />
So the tree, after the sixth round, looks like the one in figure 2.7:<br />
Stack . Stack 1