Question: Modify the above protocol so that we can detect any foul play from the malicious database holder. ( Hint: Along with the shares of a

Modify the above protocol so that we can detect any foul play from the malicious database holder. (Hint: Along
with the shares of a standard basis vector the client sends the shares of a standard-basis vector scaled with a random
\alpha .). Prove the correctness.The answer to the question is:-1.Key Idea :-The key idea here is that :-Along with the shares of a
standard basis vector the client sends the shares of a standard-basis
vector scaled with a random variable say \alpha .
2.Setup :-Again the server generates two random strings r0 and r1
such that r0 r1= e
i
[standard basis vector] and \alpha .(r0 r1)=\alpha .
(e
i
)
3.Client-Sever Interation : -The client send r0,\alpha .(r0) to S0 and
r1,\alpha .(r1) to S1.
4. Server-Client Interaction : - The server responds with (r0,
b
and \alpha r0,
b) to S0, and (r1,
b and \alpha r1,
b) to server S1.
5. Client Verification :- The server checks if
\alpha .(r0,
br1,
b)=r0,
br1,
b then returns true and holds the
queried index of database as r0,
br1,
b
Otherwise returns false means that one of the Servers is malicious.Can you do prove of correctness

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!