SLIDE 97 Concluding Remarks
Lightweight. For very efficient implementation use f (x) = AESIV(x) ⊕ x:
Length 232 chain in 516 bytes at max. 16 hashes per identification round. Length 216 chain in 258 bytes at max. 8 hashes per identification round.
Post-Quantum:
Lamport’s identification scheme: asymmetric but entirely hash-based Merkle authentication trees: in-place traversal?
Time-Space Product for length n = 2k chain:
binary pebbling:
1 2 k2
Coppersmith-Jakobsson lower bound: ≈ 1
4 k2
bound already found by Grim et al. [GPRS96] lower bound does not take limited number of hashes per round into account
Potential alternative: Fibonacci pebbling with n = Fk
See also eprint.iacr.org/2014/329. Sample code: www.win.tue.nl/˜berry/pebbling/.
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers