Define the authenticated data structures

Assignment Help Computer Networking
Reference no: EM131467631

Question: Authenticated Data Structures. You are designing SecureBox, an authenticated online file storage system. For simplicity, there is only a single folder. Users must be able to add, edit, delete, and retrieve files, and to list the folder contents. When a user retrieves a file, SecureBox must provide a proof that the file hasn't been tampered with since its last update. If a file with the given name doesn't exist, the server must report that - again with a proof.

We want to minimize the size of these proofs, the time complexity of verifying them, and the size of the digest that the user must store between operations. (Naturally, to be able to verify proofs, users must at all times store some nonzero amount of state derived from the folder contents. Other than this digest the user has no memory of the contents of the files she added.)

Here's a naive approach. The user's digest is a hash of the entire folder contents, and proofs are copies of the entire folder contents. This results in a small digest but large proofs and long verification times. Besides, before executing add/delete/edit operations, the user must retrieve the entire folder so that she can recompute the digest.

Alternatively, the digest could consist of a separate hash for each file, and each file would be its own proof. The downside of this approach is that it requires digest space that is linear in the number of files in the system.

Can you devise a protocol where proof size, verification time, and digest size are all sublinear? You might need a sub-protocol that involves some amount of two-way communication for the user to be able to update her digest when she executes and add, delete, or edit.

Reference no: EM131467631

Questions Cloud

What is the height of the center of gravity : (a) What is the height of the center of gravity (above the 2cm base)?
Can merkle digest support the merge operation of two lists : Consider using Merkle tree to digest a list of distinct messages. Can Merkle digest support the merge operation of two such lists? Specifically, given lists.
What is the phase of the moon : This rarely happens because the moon's orbit is inclined by about 5 degrees with respect to the earth's orbit around the sun, but it does occur occasionally.
Explains how both works deal with this theme : Choose one short story and one play that you believe share a similar theme, and write an essay that explains how both works deal with this theme
Define the authenticated data structures : Authenticated Data Structures. You are designing SecureBox, an authenticated online file storage system. For simplicity, there is only a single folder.
When an item is sold from inventory cost must be assigned : When an item is sold from inventory a cost must be assigned in order to remove the cost of the item from inventory and determine gross profit.
Certification of union by nlrb using secret-ballot election : Which of the following statements is TRUE of certification of a union by the NLRB using a secret-ballot election?
Identify and analyze at least three action alternatives : Identify and analyze at least three action alternatives. Each should be viable and significantly different .
Calculate the overall sentiment value for each topic : CS 2034 Data Analytics: Principles and Tools - Determine the total number of Positive, Negative, and Neutral Tweets in the dataset

Reviews

Write a Review

Computer Networking Questions & Answers

  What topology works best for the offices

What topology works best for the offices

  Calculate rsa signature on long message by computing mod

Calculate RSA signature on long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Congestion control in error-free virtual circuit subnet

Consider the following method for congestion control in a error-free virtual circuit subnet.

  Research both legacy and voip telecommunications

Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide 3 sources for your ideas.

  Among the following devices

Among the following devices, which one can you not use full duplex connection? Switch, router , hub

  Differences between lan and wan

What are the predominant network operating systems in use today? What are the differences between LAN and WAN operating systems?

  Do you use the internet for private transactions

Do you use the Internet for private transactions? How are these transactions secured?

  Probability of collision in computer network

In CSMA/CD, after the 6th collision, what is the probability that a node chooses k=7? The result k=7 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

  Understand about compatibility in network architecture

What you understand about 'Compatibility' in network architecture and explain which topology suits the client-server network environment.

  Using the web search for software firewalls examine the

using the web search for software firewalls. examine the various alternatives available and compare their

  Explain which sdlc step is associated with project component

Be sure to define the SDLC model and methodology and identify which SDLC step is associated with each project component.

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd