birthday paradox
Recently Published Documents


TOTAL DOCUMENTS

34
(FIVE YEARS 4)

H-INDEX

9
(FIVE YEARS 1)

Information ◽  
2020 ◽  
Vol 11 (2) ◽  
pp. 90 ◽  
Author(s):  
Zvi Schreiber

Blockchains such as the bitcoin blockchain depend on reaching a global consensus on the distributed ledger; therefore, they suffer from well-known scalability problems. This paper proposes an algorithm that avoids double-spending in the short term with just O(√n) messages instead of O(n); each node receiving money off-chain performs the due diligence of consulting k√n random nodes to check if any of them is aware of double-spending. Two nodes receiving double-spent money will in this way consult at least one common node with very high probability, because of the ‘birthday paradox’, and any common honest node consulted will detect the fraud. Since the velocity of money in the real world has coins circulating through at most a few wallets per day, the size of the due diligence communication is small in the short term. This ‘k-root-n’ algorithm is suitable for an environment with synchronous or asynchronous (but with fairly low latency) communication and with Byzantine faults. The presented k-root-n algorithm should be practical to avoid double-spending with arbitrarily high probability, while feasibly coping with the throughput of all world commerce. It is resistant to Sybil attacks even beyond 50% of nodes. In the long term, the k-root-n algorithm is less efficient. Therefore, it should preferably be used as a complement, and not a replacement, to a global distributed ledger technology.


Author(s):  
Zvi Schreiber

Blockchains such as the bitcoin blockchain depend on reaching a global consensus on the distributed ledger; therefore, they suffer from well know scalability problems. This paper proposes an algorithm that avoids double-spending in the short term with just O(√n) messages; each node receiving money off-chain performs the due diligence of consulting k√n random nodes to check if any of them is aware of double-spending. Two nodes receiving double-spent money will in this way consult at least one common node with very high probability, due to the ‘birthday paradox’, and any common honest node consulted will detect the fraud. Since the velocity of money in the real world has coins circulating through at most a few wallets per day, the size of the due diligence communication is small in the short term. This `k-root-n’ algorithm is suitable for an environment with synchronous or asynchronous (but with fairly low latency) communication and with Byzantine faults. The presented k-root-n algorithm should be practical to avoid double-spending with arbitrarily high probability, while feasibly coping with the throughput of all world commerce. It is resistant to Sybil attacks even beyond 50% of nodes. In the long term, the k-root-n algorithm is less efficient. Therefore, it should preferably be used as a complement and not a replacement to a global distributed ledger technology.


2019 ◽  
Vol 24 (1) ◽  
pp. 29-41
Author(s):  
Péter Hudoba ◽  
Péter Burcsi

Suppose there are n people in a classroom and we want to decide if there are two of them who were born on the same day of the year. The well-known birthday paradox is concerned with the probability of this event and is discussed in many textbooks on probability. In this paper we focus on cryptographic aspects of the problem: how can we decide if there is a collision of birthdays without the participants disclosing their respective date of birth. We propose several procedures for solving this in a privacy-preserving way and compare them according to their computational and communication complexity.


2018 ◽  
pp. 13-25
Author(s):  
Gábor Lencse ◽  
Youki Kadobayashi

The trustworthy operation of the DNS service is a very important precondition for a secure Internet. As we point it out, DNS cache poisoning could be even more dangerous if it is performed against DNS64 servers. Based on RCF 5452, we give an introduction to the three main components of DNS cache poisoning vulnerability, namely Transaction ID prediction, source port number prediction, and birthday paradox based attack, which is possible if a DNS or DNS64 server sends out multiple equivalent queries (with identical QNAME, QTYPE, and QCLASS fields) concurrently. We design and implement a methodology and a testbed, which can be used for the systematic testing of DNS or DNS64 implementations, whether they are susceptible to these three vulnerabilities. We perform the tests with the following DNS64 implementations: BIND, PowerDNS, Unbound, TOTD (two versions) and mtd64-ng. As for the testbed, we use three virtual Linux machines executed by a Windows 7 host. As for tools, we use VMware Workstation 12 Player for virtualization, Wireshark and tshark for monitoring, dns64perf for Transaction ID and source port predictability tests, and our currently developed "birthday-test" program for concurrently sent multiple equivalent queries testing. Our methodology can be used for DNS cache poisoning vulnerablility analysis of further DNS or DNS64 implementations. A testbed with the same structure may be used for security vulnerablility analysis of DNS or DNS64 servers and also NAT64 gateways concerning further threats.


2016 ◽  
Vol 116 (10) ◽  
Author(s):  
Juan-Diego Urbina ◽  
Jack Kuipers ◽  
Sho Matsumoto ◽  
Quirin Hummel ◽  
Klaus Richter

2015 ◽  
Vol 36 (10) ◽  
pp. 989-997 ◽  
Author(s):  
Peter Krawitz ◽  
Orion Buske ◽  
Na Zhu ◽  
Michael Brudno ◽  
Peter N. Robinson
Keyword(s):  

Author(s):  
Pablo García ◽  
Jeroen van de Graaf ◽  
Alejandro Hevia ◽  
Alfredo Viola
Keyword(s):  

PLoS ONE ◽  
2014 ◽  
Vol 9 (4) ◽  
pp. e95425 ◽  
Author(s):  
Masoud Shakiba ◽  
Mandeep Jit Singh ◽  
Elankovan Sundararajan ◽  
Azam Zavvari ◽  
Mohammad Tariqul Islam

Sign in / Sign up

Export Citation Format

Share Document