Can you devise a protocol where proof size

Assignment Help Computer Engineering
Reference no: EM131446962

Bitcoin and Cryptocurrency Technologies

Authenticated Data Structures. You are designing SecureBox, an authenticated online file storage system. For simplicity, there is only a single folder. Users must be able to add, edit, delete, and retrieve files, and to list the folder contents. When a user retrieves a file, SecureBox must provide a proof that the file hasn't been tampered with since its last update. If a file with the given name doesn't exist, the server must report that - again with a proof.

We want to minimize the size of these proofs, the time complexity of verifying them, and the size of the digest that the user must store between operations. (Naturally, to be able to verify proofs, users must at all times store some nonzero amount of state derived from the folder contents. Other than this digest the user has no memory of the contents of the files she added.)

Here's a naive approach. The user's digest is a hash of the entire folder contents, and proofs are copies of the entire folder contents. This results in a small digest but large proofs and long verification times. Besides, before executing add/delete/edit operations, the user must retrieve the entire folder so that she can recompute the digest.

Alternatively, the digest could consist of a separate hash for each file, and each file would be its own proof. The downside of this approach is that it requires digest space that is linear in the number of files in the system.

Can you devise a protocol where proof size, verification time, and digest size are all sublinear? You might need a sub-protocol that involves some amount of two-way communication for the user to be able to update her digest when she executes and add, delete, or edit.

Hint: use the Merkle tree idea from Section 1.2.

Bitcoin and Cryptocurrency Technologies (page 49)-

https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton_bitcoin_book.pdf

Reference no: EM131446962

Questions Cloud

Developing international hotels : What are some of the current issues and concerns hotel companies must content with in developing international hotels.
What business opportunity might project completion create : What information should be included in the following elements of the project charter: What is the problem the project proposes to address? What business opportunity might project completion create
Two savings accounts offered by different banks : You are looking at two savings accounts offered by different banks. One pays 5.25% APR, with daily compounding. The other pays 5.3% APR with semiannual compounding. Which account should you use to get more from your deposit?
Define the characteristics of a group : Define the characteristics of a group and identify how these align to group behaviours and performance within the Virgin group of companies. Explain the strengths and weaknesses of these in terms of team member behaviours such as cohesiveness, con..
Can you devise a protocol where proof size : Can you devise a protocol where proof size, verification time, and digest size are all sublinear? You might need a sub-protocol that involves some amount of two-way communication for the user to be able to update her digest when she executes and a..
What is the present value cost of owning the equipment : What is the present value cost of owning the equipment? What is the present value cost of leasing the equipment? What is the net advantage to leasing (NAL)?
Describe the core marketing functions within an organization : Describe the core marketing functions within an organization. Discuss the goals and expected outcomes of this organizational function
Same interest is annual compounding instead : Suppose you just deposited $50 today into Bank of America savings account that has an APR of 6%. Based on simple interest annually, how much will you have in the account after 35 years assuming no withdraw? What would be your answer if the same inter..
What are the essential tenets of the scientific method : What are the essential tenets of the scientific method, and why is the scientific method important to business research?  How have you incorporated the scientific method into your own research projects in the past

Reviews

Write a Review

Computer Engineering Questions & Answers

  Computer security is not an issue for organizations alone

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Hokusai - sketching streams in real time

You will implement and experiment with several algorithms to approximate historical item counts in a space-efficient manner.

  Give the advantages and the disadvantages of each method

give the advantages and the disadvantages of each method.

  Describe some of the attributes that would prove beneficial

Describe some of the attributes that would prove beneficial to a Website for that industry. Explain how those attributes could be used and what value they would add.

  Why compression algorithms are frequently used in forensics

why Compression algorithms are frequently used in forensics.how they can potentially affect evidence, paying particular attention to algorithms implemented by forensic tools. You need to be clear yet concise.

  Determining the format of the number to be entered first

Determining the format of the number to be entered first (binary, decimal and hexadecimal). Access to the other two text boxes outside the relevant text box according to the preferred option

  Create a data frame that is equivalent to the sas data

Read in Traffic.dat using R and create a data frame that is equivalent to the SAS data set you created during the week.

  Write an evaluator for the language of sums and products

We can use structures to represent syntax trees in Prolog. For example, the expression, (3 * 4) + (5 + 6) can be represented by the syntax tree: sum(prod(num(3), num(4)), sum(num(5), num(6))) Write an evaluator for the language of sums and products

  Save the punch in or punch out date

Display an input field called "Choice" to input one of the four options - Inputting an incorrect option shall display a prompt indicating that the input was invalid and to try again.

  What is the average number of machine cycles

What is the average number of machine cycles per instruction for this microprocessor - What is the clock rate (machine cycles per second) required for this microprocessor to be a "1 MIPS" processor?

  How java programming knowledge benefits nonprogramming

How does information of programming concepts benefits individuals working in almost any IT position? Include at least one specific example of how java programming knowledge benefits nonprogramming working in IT?

  Describe virtual and augmented reality

Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future , either to improve a current process / procedure or create a new process / procedure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd