[tahoe-dev] "Elk Point" design for mutable, add-only, and immutable files
David-Sarah Hopwood
david-sarah at jacaranda.org
Fri Sep 11 10:34:00 PDT 2009
David-Sarah Hopwood wrote:
> I've designed a new version of the cap protocol I posted a few days
> ago, that addresses Brian's comments about roadblock attacks.
[...]
> A conservative choice of parameters might be
>
> immutable: n = 128, t = 128, ell = 160, m = 160.
> read caps 256 bits, verify caps 320 bits, read/verify 228 bits.
I meant: read/verify caps 288 bits.
> 2^128 confidentiality and collision resistance; roadblock
> attacks are effectively impossible.
>
> mutable: n = 128, t = 50, ell = 160, m = 160.
> read caps 178 bits, verify caps 320 bits, read/verify 228 bits.
Same here: read/verify caps 288 bits.
> 2^128 confidentiality; collision resistance not relevant.
> Resistance to roadblock attacks is sufficient provided
> strategy 2 described below is used.
--
David-Sarah Hopwood ⚥ http://davidsarah.livejournal.com
More information about the tahoe-dev
mailing list