10 | | ||7||unauthorized deletion||brute force KD||anyone||any one file||secrecy of ''KD''||2^''d'' |
11 | | ||8||unauthorized deletion||figure out the destroy key KD from Dhash||anyone||any one file||the hash function's pre-image resistance on ''Dhash''||brute force on ''KD'' is !#7 |
12 | | ||9||denial of service||prevent access to servers holding sufficient shares (by controlling some of them, or by attacking them)||anyone||any file||not prevented by crypto||n/a |
| 10 | ||7||unauthorized deletion||brute force KD||anyone||any one file||secrecy of ''KD''||2^''d''^|| |
| 11 | ||8||unauthorized deletion||figure out the destroy key KD from Dhash||anyone||any one file||the hash function's pre-image resistance on ''Dhash''||brute force on ''KD'' is !#7|| |
| 12 | ||9||denial of service||prevent access to servers holding sufficient shares (by controlling some of them, or by attacking them)||anyone||any file||not prevented by crypto||n/a|| |
| 13 | ||10||cause invalid share to verify||generate (''K1enc'',''Dhash'',''V'') that hash to someone else's (''T'',''U''), and copy their ''S''||anyone||any one file||the hash function's second-pre-image resistance on (''T'',''U'')||2^''t''+''u''^|| |
| 14 | ||11||undeletion||undelete a file (making it readable by existing read caps) by restoring its shares||anyone||any one file||assuming a "tombstone" is present on all relevant servers: same as !#10||2^''t''+''u''^|| |