FIN553: Suppose a hash function H(x,y) whose range is {0,1,…,2n-1}, can be used for a proof of work scheme. Once an x and a target: Blockchain Security and Privacy Assignment, SUSS

Question 1

Suppose a hash function H(x,y) whose range is {0,1,…,2n-1}, can be used for a proof of work scheme. Once an x and a target threshold t are published, the miners need to find a y such that H(x,y)< t. Suppose that x, and y are both m-bit binary strings and consider the hash function

Here ⊕ denotes a bit-wise xor. Show that this H is insecure as a proof of work hash. In particular, suppose t is fixed ahead of time. Show that a clever attacker can find a solution y with minimal effort once x is published. Hint: the attacker can do precomputation before x is published.

Question 2

One can use a binary Merkle tree to commit to a list of elements so that later he can prove that using a Merkle proof containing at most hash values. The binding commitment to is a single hash value. Evaluate and explain how to do the same using a -ary tree, that is, where every non-leaf node has up to children. The hash value for every non-leaf node is computed as the hash of the concatenation of the values of all its children.

Buy Custom Answer of This Assessment & Raise Your Grades
Get A Free Quote

The post FIN553: Suppose a hash function H(x,y) whose range is {0,1,…,2n-1}, can be used for a proof of work scheme. Once an x and a target: Blockchain Security and Privacy Assignment, SUSS appeared first on Singapore Assignment Help.

GET HELP WITH YOUR HOMEWORK PAPERS @ 25% OFF

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Write My Paper Button

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
👋 Hi, how can I help?
Scroll to Top