As promised ... sorry, not much notice before meeting, but it is brief.Also, objecthash, as discussed last time: https://github.com/benlaurie/objecthash.
--
You received this message because you are subscribed to the Google Groups "binary-transparency" group.
To unsubscribe from this group and stop receiving emails from it, send an email to binary-transpar...@googlegroups.com.
To post to this group, send email to binary-tr...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/binary-transparency/CABrd9SQaMhP4nAPy3jsSeQinG94yD0hNYBzyFVG1mhAhrfEf8g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
This paper says that "Clients of the map can... efficiently detect split-view attacks". However, the revocation transparency paper [1] has the section "Consistency with Claimed Changes Is Not Enough" which seems to say that the given consistency proofs are not enough to defend against split-view attacks, and that you need some sort of CT-log-based structure to actually be safe. This seems to say to me that verifiable maps do *not* allow a client to efficiently detect split-view attacks. Have I misunderstood something?
Phil
[1]: http://sump2.links.org/files/RevocationTransparency.pdf
On Friday, 4 December 2015 09:59:14 UTC, Ben Laurie wrote:As promised ... sorry, not much notice before meeting, but it is brief.Also, objecthash, as discussed last time: https://github.com/benlaurie/objecthash.
--
You received this message because you are subscribed to the Google Groups "binary-transparency" group.
To unsubscribe from this group and stop receiving emails from it, send an email to binary-transpar...@googlegroups.com.
To post to this group, send email to binary-tr...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/binary-transparency/d724b3c2-97a6-4571-9123-a892afc948c5%40googlegroups.com.
For the avoidance of any doubt, I'm talking about the section of the
paper titled "Verifiable Maps", not the section titled "Verifiable
Log-Backed Map".
The "Verifiable Maps" section says that a verifiable map allows a
client to efficiently detect split-view attacks. It does not mention
any accompanying log. The accompanying log you describe seems to only
come in the "Verifiable Log-Backed Map" section?