<<  >> (p.2)
    Author Topic: Anonymous Atomic Swaps Using Homomorphic Hashing  (Read 1144 times)
    empty[g]
    Newbie
    *
    Offline Offline

    Activity: 7
    Merit: 11


    View Profile
    September 06, 2018, 09:50:52 AM
     #21

    Hi

    Just thought I might share this. It is a simple attack, that the following proof shows will not work

    h = sn mod p

    Assume an attacker want to find a power m such that

    hm mod p = s

    => s = s(n.m) mod p

    => s(n.m) - s = 0 (mod p)

    The attacker would have to solve the above congruence.

    Using the theorem from my previous post, this implies that the congruence can be factorized to yield

    s.(s(n.m-1) - 1)

    This yields roots s = 0, s = 1 and possibly s = -1 for all values of n and m

    Therefore for s > 1 there are no values of m that can be used to determine the pre-image s from the hash h.

    i think your answer to this attack is right, maybe not complete but right.
    it is not possible to determine a 'm' that works regardless of 's' with only having h(s)
    i don't see how collisions effect this.

    -----------

    also don't be disappointed with collisions problem, i have found 46337 as a prime number without collisions for n=3 with brute force
    i suggest that if you can find a way to determine if a prime number has collisions or not WITHOUT brute force the problem is solved.(as we need a large number that denies the possibility of brute force and it is not wise to determine itself with brute force  Grin )
Page 1
Viewing Page: 2