(no title)
ivmaykov | 7 years ago
We offer a proof that LtHash with our choice of parameters provides over 200 bits of security. You would have to read the paper for the details.
ivmaykov | 7 years ago
We offer a proof that LtHash with our choice of parameters provides over 200 bits of security. You would have to read the paper for the details.
Scaevolus|7 years ago
E: Ah, there it is, in the paper:
> However, Wagner [Wag02] later showed an attack on the generalized birthday problem which could be used to find collisions > for AdHash on an n-bit modulus in time O(2^(2√n)), and that the AdHash modulus needs to be greater > than 1600 bits long to provide 80-bit security. Lyubashevsky [Lyu05] and Shallue [Sha08] showed > how to solve the Random Modular Subset Sum problem (essentially equivalent to finding collisions > in AdHash) in time O(2^(n^ε)) for any ε < 1, which indicates that AdHash requires several more orders > of magnitude larger of a modulus just to provide 80-bit security.
_urga|7 years ago
For synchronization purposes in a trusted system, a Merkle tree based on XOR seems elegant and efficient, but I can't seem to find accessible papers on this.