Can you devise a protocol where proof size

Assignment Help Computer Engineering
Reference no: EM131446962

Bitcoin and Cryptocurrency Technologies

Authenticated Data Structures. You are designing SecureBox, an authenticated online file storage system. For simplicity, there is only a single folder. Users must be able to add, edit, delete, and retrieve files, and to list the folder contents. When a user retrieves a file, SecureBox must provide a proof that the file hasn't been tampered with since its last update. If a file with the given name doesn't exist, the server must report that - again with a proof.

We want to minimize the size of these proofs, the time complexity of verifying them, and the size of the digest that the user must store between operations. (Naturally, to be able to verify proofs, users must at all times store some nonzero amount of state derived from the folder contents. Other than this digest the user has no memory of the contents of the files she added.)

Here's a naive approach. The user's digest is a hash of the entire folder contents, and proofs are copies of the entire folder contents. This results in a small digest but large proofs and long verification times. Besides, before executing add/delete/edit operations, the user must retrieve the entire folder so that she can recompute the digest.

Alternatively, the digest could consist of a separate hash for each file, and each file would be its own proof. The downside of this approach is that it requires digest space that is linear in the number of files in the system.

Can you devise a protocol where proof size, verification time, and digest size are all sublinear? You might need a sub-protocol that involves some amount of two-way communication for the user to be able to update her digest when she executes and add, delete, or edit.

Hint: use the Merkle tree idea from Section 1.2.

Bitcoin and Cryptocurrency Technologies (page 49)-

https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton_bitcoin_book.pdf

Reference no: EM131446962

Questions Cloud

Developing international hotels : What are some of the current issues and concerns hotel companies must content with in developing international hotels.
What business opportunity might project completion create : What information should be included in the following elements of the project charter: What is the problem the project proposes to address? What business opportunity might project completion create
Two savings accounts offered by different banks : You are looking at two savings accounts offered by different banks. One pays 5.25% APR, with daily compounding. The other pays 5.3% APR with semiannual compounding. Which account should you use to get more from your deposit?
Define the characteristics of a group : Define the characteristics of a group and identify how these align to group behaviours and performance within the Virgin group of companies. Explain the strengths and weaknesses of these in terms of team member behaviours such as cohesiveness, con..
Can you devise a protocol where proof size : Can you devise a protocol where proof size, verification time, and digest size are all sublinear? You might need a sub-protocol that involves some amount of two-way communication for the user to be able to update her digest when she executes and a..
What is the present value cost of owning the equipment : What is the present value cost of owning the equipment? What is the present value cost of leasing the equipment? What is the net advantage to leasing (NAL)?
Describe the core marketing functions within an organization : Describe the core marketing functions within an organization. Discuss the goals and expected outcomes of this organizational function
Same interest is annual compounding instead : Suppose you just deposited $50 today into Bank of America savings account that has an APR of 6%. Based on simple interest annually, how much will you have in the account after 35 years assuming no withdraw? What would be your answer if the same inter..
What are the essential tenets of the scientific method : What are the essential tenets of the scientific method, and why is the scientific method important to business research?  How have you incorporated the scientific method into your own research projects in the past

Reviews

Write a Review

Computer Engineering Questions & Answers

  Illustrate the difference between the throwing an exception

question 1 what is the difference between throwing an exception and catching an exception?question 2 how does a method

  Management tools for microsoft windows server

Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration

  Define interactions required between a user and a web site

design a flowchart of the interactions required between a user and a web site during a shopping cart "checkout". Possible error conditions such as missing input or invalid credit card numbers.

  Write a java program that creates an array of integers

Write a java program that creates an array of integers

  Determine the scope of a variable declared in for statement

Write test programs in C++, Java, and C# to determine the scope of a variable declared in a for statement. Specifically, the code must determine whether such a variable is visible after the body of the for statement

  Write down a 2- to 3-page memo describing the financial

write a 2- to 3-page memo explaining the financial implications of your project that does the following middot

  List and describe the methods for installing software

List and explain the methods for installing software. Conclude with a recommendation for your preferred software installation approach; explain why you believe this is the best approach to install software.

  What is the pert variance for the given activity

Given an activity's optimistic, most likely, and pessimistic time estimates of 4, 12, and 18 days respectively, what is the PERT variance for this activity?

  Exploring substantial component of information security

Explain the weaknesses in the controls? Specify whether there exist any new or upgraded access controls being considered? Let us explore this substantial component of the information security.

  Design an application that declares a purchase object

as you prompt for a sale amount, do not proceed until the user has entered a nonnegative value. After a valid urchase object has been created, display the objects invice number, sale amount, and sales tax.

  What subsystems were involved in this problem

Think about the most difficult troubleshooting problem you've encountered in your recent experience- one where the solutions was not straightforward and where the problem was into a simple request for information.

  Describe the three subsystems which make up a

read the questions below and formulate a brief answer. your response to each question should be at least 2-5 sentences

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd