(no title)
ivmaykov | 7 years ago
If you want to use signatures over the hash as proof of data set integrity, you need two things. 1) you need to make sure that hash({a}) + hash({b}) == hash({a, b}). 2) ensure that hash() is collision resistant - in other words, it needs to be computationally infeasible to find hash(S) == hash(T), S != T for any sets S and T. We prove that LtHash with our choice of parameters has this property in the paper (which is linked from the blog post).
dfox|7 years ago
ivmaykov|7 years ago
We offer a proof that LtHash with our choice of parameters provides over 200 bits of security. You would have to read the paper for the details.
rstuart4133|7 years ago
scottlocklin|7 years ago