Changes To Experiment: Chainsignature
Not logged in

Changes to "Experiment: Chainsignature" between 2017-08-02 11:16:52 and 2019-03-24 14:37:06

    24     24   <pre><font color="#ff0000">    cp ./x.blob ./x_hijacker.blob</font></pre>
    25     25   <pre>    cat ./M_n.blob &gt;&gt; ./x.blob</pre>
    26     26   <pre>    sha256sum ./x.blob &gt; ./the_signature.txt</pre>
    27     27   <pre><font color="#ff0000">    cat ./M_n_hijacker &gt;&gt; ./x_hijacker.blob</font></pre>
    28     28   <pre><font color="#ff0000">    sha256sum ./x_hijacker.blob &gt; ./hijacked_branch_message_signature.txt</font></pre>
    29     29   <pre><br>
    30     30   
           31  +
           32  +
    31     33   
    32     34   </pre>
    33     35   
    34     36   <p>The M_n must be included to the signature calculation x.blob to make sure
    35     37   that an eavesdropper can not reuse the signature for signing its own message.
    36     38   To make eavesdropping and hijacking more difficult, different messages might be
    37     39   sent through different channels.&nbsp;</p>
................................................................................
    61     63   scheme is usable with non-cooperative anonymity.</p>
    62     64   
    63     65   <p><br>
    64     66   </p>
    65     67   
    66     68   <h1>Similar Ideas and Projects</h1>
    67     69   
    68         -<p>The obvious source of inspiration is the Bitcoin.</p>
           70  +<p>The obvious source of inspiration is the Bitcoin. Some other inspiration
           71  +sources are:</p>
           72  +
           73  +<p>
           74  +<ul>
           75  +<li>A
           76  +<a href="https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/">2018_04_07
           77  +blog post</a>&nbsp;<i>(<a href="https://archive.is/zLTyw">archival copy</a>,
           78  +local copy)</i> by Matthew Green</li>
           79  +</ul></p>
    69     80   
    70     81   <p><br>
    71     82   </p>