Add solution for 5k

This commit is contained in:
Tobias Eidelpes 2022-06-28 11:02:36 +02:00
parent 1ce38abbf4
commit 2dabc0a1a4

View File

@ -380,7 +380,13 @@
Futhermore, the commitment is also not vulnerable to dictionary attacks, Futhermore, the commitment is also not vulnerable to dictionary attacks,
as is common with stored password hashes on the server's side. as is common with stored password hashes on the server's side.
\item \TODO \item If the function generating the isomorphisms keeps the same $k=36$
first vertices, the security degrades considerably. Under normal
circumstances, the number of possible isomorphisms is $1107!$. If the
first $36$ vertices are always kept the same, the domain shrinks to
$(1107-36)!=1071!$. While the difference might not seem to be practically
relevant, the security degrades factorially with every further reduction
in graph size.
\item The signer calculates a commitment with a predefined soundness error. \item The signer calculates a commitment with a predefined soundness error.
Then the signer calculates the challenge by taking the hash of the message Then the signer calculates the challenge by taking the hash of the message