From 3bdfb6fdde4dff617598a7fd9d5a3cacadb6b457 Mon Sep 17 00:00:00 2001 From: davidsarah <> Date: Sun, 11 Oct 2009 03:34:38 +0000 Subject: [PATCH] add footnote 6 [Imported from Trac: page NewCaps/WhatCouldGoWrong, version 25] --- NewCaps/WhatCouldGoWrong.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/NewCaps/WhatCouldGoWrong.md b/NewCaps/WhatCouldGoWrong.md index bddb68e..f4127b1 100644 --- a/NewCaps/WhatCouldGoWrong.md +++ b/NewCaps/WhatCouldGoWrong.md @@ -6,7 +6,7 @@ This is about What Could Go Wrong with the "Elk Point 2" immutable file caps: *S*|brute force on *R* is !#2| |7|unauthorized deletion|brute force KD|anyone|any one file|secrecy of *KD*|2^*d*^| @@ -29,5 +29,7 @@ where *k* = bitlength(*K1*), *n* = bitlength(*R*), *s* = bitlength(*S*), *t* = b 5. Brute force costs assume a single-target attack that is expected to succeed with high probability. Costs will be lower for attacking multiple targets or for a lower success probability. (Should we give explicit formulae for this?) +6. *roadblock*/*speedbump* attacks could be restricted to holders of a read cap by use of an extra signature, as in the Elk Point 3 design (diagram at for mutable files). + \ No newline at end of file