### Abstract

We present two new parallel algorithms for extending the domain of a UOWHF. The first algorithm is complete binary tree based construction and has less key length expansion than Sarkar's construction which is the previously best known complete binary tree based construction. But only disadvantage is that here we need more key length expansion than that of Shoup's sequential algorithm. But it is not too large as in all practical situations we need just two more masks than Shoup's. Our second algorithm is based on non-complete l-ary tree and has the same optimal key length expansion as Shoup's which has the most efficient key length expansion known so far. Using the recent result [10], we can also prove that the key length expansion of this algorithm and Shoup's sequential algorithm are the minimum possible for any algorithms in a large class of "natural" domain extending algorithms. But its parallelizability performance is less efficient than complete tree based constructions. However if / is getting larger, then the parallelizability of the construction is also getting near to that of complete tree based constructions. We also give a sufficient condition for valid domain extension in sequential domain extension.

Original language | English |
---|---|

Pages (from-to) | 49-58 |

Number of pages | 10 |

Journal | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |

Volume | E88-A |

Issue number | 1 |

DOIs | |

Publication status | Published - 2005 Jan |

### Keywords

- Hash function
- Masking assignment
- Parallel construction
- Sequential construciton
- Tree based construction
- UOWHF

### ASJC Scopus subject areas

- Signal Processing
- Computer Graphics and Computer-Aided Design
- Electrical and Electronic Engineering
- Applied Mathematics

## Fingerprint Dive into the research topics of 'Construction of UOWHF: Two new parallel methods'. Together they form a unique fingerprint.

## Cite this

*IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences*,

*E88-A*(1), 49-58. https://doi.org/10.1093/ietfec/E88-A.1.49