Question: Write a simple protocol that allows a client to privately retrieve the i th record of the database. Now, assume that one of the servers

Write a simple protocol that allows a client to privately retrieve the i
th record of the database. Now, assume that one of the servers is malicious and can tamper with the database. Would the above protocol still
work? Why/Why not? Now, Modify the above protocol so that we can detect any foul play from the malicious database holder. (Hint: Along
with the shares of a standard basis vector the client sends the shares of a standard-basis vector scaled with a random
\alpha .). Prove the correctness.Solve the above question by taking the case of shamir secret sharing method or any other secret sharing method [Solve in a mathematical way]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!