Alice has five files F1, F2, F3, F4, F5 that she wants to storeon Bobs computer (Bob
Fantastic news! We've Found the answer you've been seeking!
Question:
Alice has five files F1, F2, F3, F4, F5 that she wants to storeon Bob’s computer (Bob just purchased a new server that has agigantic hard disk). However, Alice is worried that Bob mightcorrupt or modify the files. Now Alice wants to retrieve fileF3 from Bob’s computer.
(a) What does Bob send to Alice? Recall that Bob needs to“prove” to Alice that the file has not been modified.
(b) Show that it is “hard” for Bob to generate a “proof” for Alicefor a file F3' different from F3. We of course assume that hashfunctions that the Merkle
hash tree is constructed from is collision resistant.
Related Book For
Making Hard Decisions with decision tools
ISBN: 978-0538797573
3rd edition
Authors: Robert Clemen, Terence Reilly
Posted Date: