Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

: Merkle tree is one of the most widely used data structure in cryptography and in computer science in general. It is a succinct commitment

: Merkle tree is one of the most widely used data structure in cryptography and in computer science in general. It is a succinct commitment to a set of values. For example, given a set of values
1,2,3,4, and each in {0,1}, we can use them as leaf values and build a tree, the root will be committed value to the set, i.e.
12=(1,2),34=(3,4) and =(12,34), where
: {0,1}2->{0,1} is a collision resistant function.
Suppose a Chandler stores only and outsource the original values 1,2,3,4 to a friend Joey.
After the above setup, Chandler may query Joey for certain value when needed. For example, Chandler may ask Joey to send back the second value and prove to him it is indeed the original one.
Joey sends 2, and also sends 1,34 as the proof \pi 2 of validity for
2. Chandler simply tries to reconstruct from 2,\pi 2.
a) Briefly explain why Joey cant cheat? For example, why Joey cant send back another value and still convinces
Chandler? (10 pts.)
b) Can example still work if we replace to be one-way function? If yes, briefly explain, if not give a counter example/attack.(10 pts.)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Secrets Of Analytical Leaders Insights From Information Insiders

Authors: Wayne Eckerson

1st Edition

1935504347, 9781935504344

More Books

Students also viewed these Databases questions

Question

2. Ask, What would happen if?

Answered: 1 week ago