Add solution for 5k
This commit is contained in:
parent
1ce38abbf4
commit
2dabc0a1a4
@ -380,7 +380,13 @@
|
||||
Futhermore, the commitment is also not vulnerable to dictionary attacks,
|
||||
as is common with stored password hashes on the server's side.
|
||||
|
||||
\item \TODO
|
||||
\item If the function generating the isomorphisms keeps the same $k=36$
|
||||
first vertices, the security degrades considerably. Under normal
|
||||
circumstances, the number of possible isomorphisms is $1107!$. If the
|
||||
first $36$ vertices are always kept the same, the domain shrinks to
|
||||
$(1107-36)!=1071!$. While the difference might not seem to be practically
|
||||
relevant, the security degrades factorially with every further reduction
|
||||
in graph size.
|
||||
|
||||
\item The signer calculates a commitment with a predefined soundness error.
|
||||
Then the signer calculates the challenge by taking the hash of the message
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user