16.5 Exercises

  1. In the scheme of Section 16.2, show that a valid coin satisfies the verification equations

    grahH(A, B, z, a, b), ArzH(A, B, z, a, b, r)b,  and g1r1g2r2AdB (mod p).
  2. In the scheme of Section 16.2, a hacker discovers the Bank’s secret number x. Show how coins can be produced and spent without having an account at the bank.

  3. In the scheme of Section 16.2, the numbers g1 and g2 are powers of g, but the exponents are supposed to be hard to find. Suppose we take g1=g2.

    1. Show that if the Spender replaces r1, r2 with r1, r2 such that r1+r2=r1+r2, then the verification equations still work.

    2. Show how the Spender can double spend without being identified.

  4. Suppose that, in the scheme of Section 16.2, the coin is represented only as (A, B, a, r); for example, by ignoring z and b, taking the hash function H to be a function of only A, B, a, and ignoring the verification equation ArzHb. Show that the Spender can change the value of u to any desired number (without informing the Bank), compute a new value of I, and produce a coin that will pass the two remaining verification equations.

  5. In the scheme of Section 16.2, if the Spender double spends, once with the Merchant and once with the Vendor, why is it very likely that r2r20(modq) (where r2, r2 are as in the discussion of Fraud Control)?

  6. A Sybil attack is one in which an entity claims multiple identities or roles in order to achieve an advantage against a system or protocol. Explain why there is no advantage in launching a Sybil attack against Bitcoin’s proof of work approach to determining which user will randomly be selected to announce the next block in a blockchain.

  7. Forgetful Fred would like to save a file containing his homework to a server in the network, which will allow him to download it later when he needs it. Describe an approach using hash functions that will allow Forgetful Fred to verify that he has obtained the correct file from the server, without requiring that Fred keep a copy of the entire file to check against the downloaded file.

  8. A cryptographic hash puzzle involves finding a nonce n that, when combined with a message m, will hash to an output y that belongs to a target set S, i.e. h(nx)S.

    1. Assuming that all outputs of a k-bit cryptographic hash function are equally likely, find an expression for the average amount of nonces n that need to be tried in order to satisfy

      h(nx)<2L.
    2. Using your answer from part (a), estimate how many hashes it takes to obtain a hash value where the first 66 binary digits are 0s.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.111.24