Changes between Version 15 and Version 16 of NewMutableEncodingDesign
- Timestamp:
- 2010-01-13T00:47:27Z (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
NewMutableEncodingDesign
v15 v16 132 132 (in Figure 3). The design is: 133 133 134 * ( 1K) writecap = K-bit random string (perhaps derived from user-supplied135 material )(remember, K=kappa, probably 128bits)134 * (K + T) writecap = (K+T)-bit random string, perhaps derived from user-supplied 135 material (remember, K=kappa, probably 128bits) 136 136 * (minimum 2K) readcap = minimum 2*K-bit semiprivate key 137 137 * (minimum 2K) verifycap = public key 138 * storage-index = truncatedverifycap138 * storage-index = (possibly truncated) verifycap 139 139 140 140 On each publish, a random salt is generated and stored in the share. The data … … 151 151 Like above, but create two levels of semiprivate keys instead of just one: 152 152 153 * ( 1K) writecap = K-bit random string153 * (K + T) writecap = (K+T)-bit random string 154 154 * (minimum 2K) readcap = minimum 2*K-bit first semiprivate key 155 155 * (minimum 2K) traversalcap = minimum 2*K-bit second semiprivate key 156 156 * (minimum 2K) verifycap = public key 157 * storage-index = truncatedverifycap157 * storage-index = (possibly truncated) verifycap 158 158 159 159 The dirnode encoding would use H(writecap) to protect the child writecaps, … … 170 170 private key out of the share and into the writecap: 171 171 172 * (K ) writecap = K-bit random string = privkey172 * (K + T) writecap = (K+T)-bit random string = privkey 173 173 * (2K + T) readcap = H(writecap)[:K] + H(pubkey)[:K+T] 174 174 * (K + T) verifycap = H(pubkey)[:K+T] 175 * storage-index = truncatedverifycap175 * storage-index = verifycap 176 176 177 177 In this case, the readcap/verifycap holder is obligated to fetch the pubkey … … 188 188 requiring the client to fetch a copy: 189 189 190 * (K ) writecap = K-bit random string = privkey190 * (K + T) writecap = (K+T)-bit random string = privkey 191 191 * (minimum 3K) readcap = H(writecap)[:K] + pubkey 192 192 * (minimum 2K) verifycap = pubkey … … 206 206 doesn't even change the way the existing caps are used: 207 207 208 * ( 1K) writecap = K-bit random string = privkey208 * (K + T) writecap = (K+T)-bit random string = privkey 209 209 * (2K + T) readcap = H(writecap)[:K] + H(pubkey)[:K+T] 210 210 * (2K + T) traversalcap: H(readcap)[:K] + H(pubkey)[:K+T] 211 211 * (K + T) verifycap = H(pubkey)[:K+T] 212 * storage-index = truncatedverifycap212 * storage-index = verifycap 213 213 214 214 == Shorter readcaps (insecure) ==