Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Let F : { 0 , 1 } k times { 0 , 1 } n - > { 0 , 1 } n

Let F : {0,1}k \times {0,1}n ->{0,1}n be a good MAC. Suppose that a database contains records M1,..., Mq . To provide authenticity for the records, the admin generates a random secret key K in {0,1}k and stores Ti FK(Mi) alongside record Mi for every i =1,..., q. This does not ensure authenticity because an attacker can remove a record or duplicate a record without being detected. To deal with this, the admin generates another secret key K in {0,1}k and computes an additional tag T . She stores (K, K, T ) in her machine, away from the database.
How should the admin compute T so that if we update a single record Mi, the cost to update (Ti,T) is cheap, meaning we need to run the MAC to sign messages of total size O(|Mi|+qn)? Briefly explain why your solution can detect if an adversary modified the database.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatial Databases With Application To GIS

Authors: Philippe Rigaux, Michel Scholl, Agnès Voisard

1st Edition

1558605886, 978-1558605886

More Books

Students also viewed these Databases questions

Question

l Discuss why job analysis is changing as organizations change.

Answered: 1 week ago