Merkle trees. Alice can use a binary Merkle tree to commit to a set of elements...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Merkle trees. Alice can use a binary Merkle tree to commit to a set of elements S = T,..., Tn, so that later she can prove to Bob that some T is in S using a proof containing at most log n hash values. The binding commitment to the entire S is a single hash value. This question explores generalization to k-ary tree, that is, where every nonleaf node has up to k children. 1. Suppose S Ti,T9. Explain how Alice computes a commitment to S using a ternary Merkle tree (i.e. k= 3). Specify exactly how hash function is applied to what arguments. How can Alice later prove to Bob that T4 is in S? = 2. Suppose S contains n elements. Let the length of the hash function output be X. What is the exact length of the proof that proves that some Ti is in S, as a function of n, k, X? 3. What is the storage requirements for the k-ary tree of n leaves each of size s (and where x is the security parameter)? Discuss storage/proof size trade offs in choosing the arity (i.e. number of children per node) for Merkle trees. 4. If you are given n = 1000 Merkle trees of possibly different sizes and arity, how can you quickly (i.e. in work linear in n) combine them into a single Merkle tree and still be able to prove membership? Merkle trees. Alice can use a binary Merkle tree to commit to a set of elements S = T,..., Tn, so that later she can prove to Bob that some T is in S using a proof containing at most log n hash values. The binding commitment to the entire S is a single hash value. This question explores generalization to k-ary tree, that is, where every nonleaf node has up to k children. 1. Suppose S Ti,T9. Explain how Alice computes a commitment to S using a ternary Merkle tree (i.e. k= 3). Specify exactly how hash function is applied to what arguments. How can Alice later prove to Bob that T4 is in S? = 2. Suppose S contains n elements. Let the length of the hash function output be X. What is the exact length of the proof that proves that some Ti is in S, as a function of n, k, X? 3. What is the storage requirements for the k-ary tree of n leaves each of size s (and where x is the security parameter)? Discuss storage/proof size trade offs in choosing the arity (i.e. number of children per node) for Merkle trees. 4. If you are given n = 1000 Merkle trees of possibly different sizes and arity, how can you quickly (i.e. in work linear in n) combine them into a single Merkle tree and still be able to prove membership?
Expert Answer:
Answer rating: 100% (QA)
To compute a commitment to set S using a ternary Merkle tree k 3 Alice follows these steps Divide the set S into groups of three elements each padding with empty elements if necessary In this case we ... View the full answer
Related Book For
Introduction to Algorithms
ISBN: 978-0262033848
3rd edition
Authors: Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest
Posted Date:
Students also viewed these operating system questions
-
Select required media, cables, ports and connectors and connect switches to network devices and hosts
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
Portray in words what transforms you would have to make to your execution to some degree (a) to accomplish this and remark on the benefits and detriments of this thought.You are approached to compose...
-
Example Problem for Declining Balance Depreciation Methods Historical cost of equipment A: $120,000, purchased on January 1, 2014. Estimated salvage value: $20,000; Estimated useful life: 5 years....
-
Assume that you are convinced that creativity is a legitimate part of a leader's role, what percent of your working time do you think you should invest in creative thinking? Explain your reasoning.
-
Suppose that the subjects in an experiment are reused. For example, each person in a taste test samples every product. Are these data suitable for a one-way ANOVA?
-
Why is it important to use both internal and external benchmarking data?
-
The Lane Company was incorporated in 2001. Because it had become successful, the company established a defined benefit pension plan for its employees on January 1, 2010. Due to the loyalty of its...
-
9. What is the general form of a quadratic function?
-
write a closed-research legal memo using the case cases given, addressing whether Mr. Adler can assert an adverse possession claim to Scrub Lot 40. Please write up your memo using the issue , brief...
-
E5.14B (LO 3) (Preparation of a Statement of Cash Flows) Thecomparative balance sheets of Duong Inc. at the beginning and theend of the year 2020 appear below. DUONG INC. BALANCE SHEETS AssetsCash 1...
-
The Hoffman Company uses an absorption-costing system based on standard costs. Variable manufacturing cost consists of direct material cost of $3.00 per unit and other variable manufacturing costs of...
-
The long run phenomena of economies of scale describes as the reduction in long-run average cost and hence, in efficiency sourced to increase in firm's scale of operation. Discuss whether long-term...
-
The electric current flowing in a wire in the direction B to A is decreasing. What is the direction of induced current in the metallic loop kept above the wire as shown in Fig. O A B
-
The Modern Portfolio Theory (MPT) suggests that, without the ability to invest in a risk-free asset, a rational investor will select a portfolio (of only risky assets) on the efficient frontier (may...
-
Samuel and Annamaria are married, file a joint return, and have three qualifying children. In 2 0 2 3 , they earn wages of $ 3 4 , 0 0 0 and have no other income. Round your intermediate computations...
-
Susan Faludi pointed out in "Backlash" that the latest threat to feminism in 2001 is hyperconsumerism, which commercialized feminism. Use the concept of intersectionality in feminist theory in...
-
For a nonzero constant a, find the intercepts of the graph of (x 2 + y 2 ) 2 = a 2 (x 2 - y 2 ). Then test for symmetry with respect to the x-axis, the y-axis, and the origin.
-
Show that if L 2, then every binary tree with L leaves contains a subtree having between L/3 and 2L/3 leaves, inclusive.
-
Demonstrate what happens when we insert the keys 5, 28, 19, 15, 20, 33, 12, 17, 10 into a hash table with collisions resolved by chaining. Let the table have 9 slots, and let the hash function be...
-
Modify the proto-vEB structure to support keys that have associated satellite data.
-
Barrila Enterprises uses a word processing computer to handle its sales invoices. Lately, business has been so good that it takes an extra 3 hours per night, plus ever} third Saturday, to keep up...
-
Andrea Valencia recently opened her own basket weaving studio. She sells finished baskets in addition to the raw materials needed by customers to weave baskets of their own. Andrea has put together a...
-
Baer Inc. has been manufacturing its own shades for its table lamps. The company is currently operating at 100% of capacity, and variable manufacturing overhead is charged to production at the rate...
Study smarter with the SolutionInn App