FIN553: Suppose a hash function H(x,y) whose range is {0,1,…,2n-1}, can be used for a proof of work scheme. Once an x and a target: Blockchain Security and Privacy Assignment, SUSS, Singapore

University Singapore University of Social Science (SUSS)
Subject FIN553: Blockchain Security and Privacy

Question 1

Suppose a hash function H(x,y) whose range is {0,1,…,2n-1}, can be used for a proof of work scheme. Once an x and a target threshold t are published, the miners need to find a y such that H(x,y)< t. Suppose that x, and y are both m-bit binary strings and consider the hash function

Blockchain Security and Privacy

Here ⊕ denotes a bit-wise xor. Show that this H is insecure as a proof of work hash. In particular, suppose t is fixed ahead of time. Show that a clever attacker can find a solution y with minimal effort once x is published. Hint: the attacker can do precomputation before x is published.

Question 2

One can use a binary Merkle tree to commit to a list of elements so that later he can prove that using a Merkle proof containing at most hash values. The binding commitment to is a single hash value. Evaluate and explain how to do the same using a -ary tree, that is, where every non-leaf node has up to children. The hash value for every non-leaf node is computed as the hash of the concatenation of the values of all its children.

Buy Custom Answer of This Assessment & Raise Your Grades

Get Help By Expert

Elevate your understanding of FIN553: Blockchain Security and Privacy Assignment at Singapore University of Social Science (SUSS). Enlist the expertise of our Online Assignment Experts from Singapore Assignment Help. With our specialized, My Assignment Experts service, excel in your tutor-marked assignments and conquer the world of blockchain security and privacy.

Answer

Looking for Plagiarism free Answers for your college/ university Assignments.

Ask Your Homework Today!

We have over 1000 academic writers ready and waiting to help you achieve academic success