Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Q 5 : Merkle tree is one of the most widely used data structure in cryptography and in computer science in general. It is a

Q5: Merkle tree is one of the most widely used data structure in cryptography and in computer science in general. It is a succinct commitment to a set of values. For example, given a set of values x1,x2,x3,x4, and each xiin{0,1}n, we can use them as leaf values and build a tree, the root will be committed value to the set, i.e.h12=H(x1,x2),h34=H(x3,x4) and hroot=H(h12,h34), where H:{0,1}2n{0,1}n is a collision resistant function.
Suppose a Chandler stores only hroot and outsource the original values x1,x2,x3,x4 to a friend Joey.
After the above setup, Chandler may query Joey for certain value when needed. For example, Chandler may ask Joey to send back the second value and prove to him it is indeed the original one. Joey sends x2, and also sends x1,h34 as the proof 2 of validity for x2. Chandler simply tries to reconstruct hroot from x2,2.
a) Briefly explain why Joey can't cheat? For example, why Joey can't send back another value x2' and still convinces
Chandler
b) Can example still work if we replace H to be one-way function? If yes, briefly explain, if not give a counter
Give Example or Attack
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL Crash Course A Hands On Introduction To Database Development

Authors: Rick Silva

1st Edition

1718503008, 978-1718503007

More Books

Students also viewed these Databases questions