Add solution for 5k
This commit is contained in:
parent
1ce38abbf4
commit
2dabc0a1a4
@ -380,7 +380,13 @@
|
|||||||
Futhermore, the commitment is also not vulnerable to dictionary attacks,
|
Futhermore, the commitment is also not vulnerable to dictionary attacks,
|
||||||
as is common with stored password hashes on the server's side.
|
as is common with stored password hashes on the server's side.
|
||||||
|
|
||||||
\item \TODO
|
\item If the function generating the isomorphisms keeps the same $k=36$
|
||||||
|
first vertices, the security degrades considerably. Under normal
|
||||||
|
circumstances, the number of possible isomorphisms is $1107!$. If the
|
||||||
|
first $36$ vertices are always kept the same, the domain shrinks to
|
||||||
|
$(1107-36)!=1071!$. While the difference might not seem to be practically
|
||||||
|
relevant, the security degrades factorially with every further reduction
|
||||||
|
in graph size.
|
||||||
|
|
||||||
\item The signer calculates a commitment with a predefined soundness error.
|
\item The signer calculates a commitment with a predefined soundness error.
|
||||||
Then the signer calculates the challenge by taking the hash of the message
|
Then the signer calculates the challenge by taking the hash of the message
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user