gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r3757 - GNUnet-docs/papers/ecrs


From: grothoff
Subject: [GNUnet-SVN] r3757 - GNUnet-docs/papers/ecrs
Date: Mon, 13 Nov 2006 18:07:13 -0800 (PST)

Author: grothoff
Date: 2006-11-13 18:06:59 -0800 (Mon, 13 Nov 2006)
New Revision: 3757

Modified:
   GNUnet-docs/papers/ecrs/main.dvi
   GNUnet-docs/papers/ecrs/main.log
   GNUnet-docs/papers/ecrs/main.pdf
   GNUnet-docs/papers/ecrs/main.ps
   GNUnet-docs/papers/ecrs/main.tex
Log:
keykey

Modified: GNUnet-docs/papers/ecrs/main.dvi
===================================================================
(Binary files differ)

Modified: GNUnet-docs/papers/ecrs/main.log
===================================================================
--- GNUnet-docs/papers/ecrs/main.log    2006-11-14 00:11:07 UTC (rev 3756)
+++ GNUnet-docs/papers/ecrs/main.log    2006-11-14 02:06:59 UTC (rev 3757)
@@ -1,4 +1,4 @@
-This is pdfeTeX, Version 3.141592-1.21a-2.2 (Web2C 7.5.4) (format=pdflatex 
2006.11.8)  12 NOV 2006 17:23
+This is pdfeTeX, Version 3.141592-1.21a-2.2 (Web2C 7.5.4) (format=pdflatex 
2006.11.12)  13 NOV 2006 19:42
 entering extended mode
 **main.tex
 (./main.tex
@@ -557,8 +557,12 @@
 gned keys (KSKs).
  []
 
-[5] [6] <xymatrix 9x6 932> [7] [8] [9] <xymatrix 7x3 383> [10] [11] [12]
-[13] (./main.bbl [14]
+
+Underfull \vbox (badness 1655) has occurred while \output is active []
+
+ [5]
+[6] <xymatrix 9x6 932> [7] [8] [9] <xymatrix 7x3 383> [10] [11] [12] [13]
+(./main.bbl [14]
 Underfull \hbox (badness 6658) in paragraph at lines 85--88
 []\OT1/cmr/m/n/9 Raph Levien.  At-tack re-sis-tant trust met-rics.  Draft avail
 -able at
@@ -567,8 +571,8 @@
 ) [15] (./main.aux) ) 
 Here is how much of TeX's memory you used:
  6687 strings out of 94500
- 82803 string characters out of 1175771
- 220038 words of memory out of 1000000
+ 82803 string characters out of 1175770
+ 219038 words of memory out of 1000000
  9658 multiletter control sequences out of 10000+50000
  13509 words of font info for 54 fonts, out of 500000 for 2000
  580 hyphenation exceptions out of 8191
@@ -595,4 +599,4 @@
 sr/share/texmf-tetex/fonts/type1/bluesky/cm/cmr6.pfb></usr/share/texmf-tetex/fo
 nts/type1/bluesky/cm/cmr7.pfb></usr/share/texmf-tetex/fonts/type1/bluesky/cm/cm
 r10.pfb></usr/share/texmf-tetex/fonts/type1/bluesky/cm/cmbx12.pfb>
-Output written on main.pdf (15 pages, 245570 bytes).
+Output written on main.pdf (15 pages, 245577 bytes).

Modified: GNUnet-docs/papers/ecrs/main.pdf
===================================================================
(Binary files differ)

Modified: GNUnet-docs/papers/ecrs/main.ps
===================================================================
--- GNUnet-docs/papers/ecrs/main.ps     2006-11-14 00:11:07 UTC (rev 3756)
+++ GNUnet-docs/papers/ecrs/main.ps     2006-11-14 02:06:59 UTC (rev 3757)
@@ -12,7 +12,7 @@
 %DVIPSWebPage: (www.radicaleye.com)
 %DVIPSCommandLine: dvips main.dvi -o main.ps
 %DVIPSParameters: dpi=600
-%DVIPSSource:  TeX output 2006.11.12:1723
+%DVIPSSource:  TeX output 2006.11.13:1941
 %%BeginProcSet: tex.pro 0 0
 %!
 /TeXDict 300 dict def TeXDict begin/N{def}def/B{bind def}N/S{exch}N/X{S
@@ -5740,169 +5740,171 @@
 SDict begin [ /View [/XYZ H.V] /Dest (section.1.2) cvn H.B /DEST pdfmark
 end
  523 365 a 83 x Fr(2)112 b(Related)38 b(W)-9 b(ork)523
-668 y Fx(A)23 b(large)d(n)n(um)n(b)r(er)i(of)g(censorship-resistan)n(t)
+640 y Fx(A)23 b(large)d(n)n(um)n(b)r(er)i(of)g(censorship-resistan)n(t)
 e(\(or)h(at)h(least)g(fault-toleran)n(t\))g(publishing)g(sys-)523
-767 y(tems)g(ha)n(v)n(e)f(b)r(een)i(prop)r(osed)e(in)h(recen)n(t)g(y)n
-(ears)e([)p 0 1 0 TeXcolorrgb 2004 767 a
+739 y(tems)g(ha)n(v)n(e)f(b)r(een)i(prop)r(osed)e(in)h(recen)n(t)g(y)n
+(ears)e([)p 0 1 0 TeXcolorrgb 2004 739 a
 SDict begin H.S end
- 2004 767 a 0 1 0
-TeXcolorrgb Fx(1)p 0 1 0 TeXcolorrgb 2046 714 a
+ 2004 739 a 0 1 0
+TeXcolorrgb Fx(1)p 0 1 0 TeXcolorrgb 2046 686 a
 SDict begin H.R end
  2046
-714 a 2046 767 a
+686 a 2046 739 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.anderson96eternity) cvn H.B /ANN pdfmark end
- 2046 767 a Black Fx(,)p 0 1 0 TeXcolorrgb
-2069 767 a
+ 2046 739 a Black Fx(,)p 0 1 0 TeXcolorrgb
+2069 739 a
 SDict begin H.S end
- 2069 767 a 0 1 0 TeXcolorrgb Fx(4)p 0 1 0
-TeXcolorrgb 2110 714 a
+ 2069 739 a 0 1 0 TeXcolorrgb Fx(4)p 0 1 0
+TeXcolorrgb 2110 686 a
 SDict begin H.R end
- 2110 714 a 2110 767 a
+ 2110 686 a 2110 739 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.chen99prototype) cvn H.B /ANN pdfmark end
- 2110 767
-a Black Fx(,)p 0 1 0 TeXcolorrgb 2133 767 a
+ 2110 739
+a Black Fx(,)p 0 1 0 TeXcolorrgb 2133 739 a
 SDict begin H.S end
- 2133 767
-a 0 1 0 TeXcolorrgb Fx(5)p 0 1 0 TeXcolorrgb 2175 714
+ 2133 739
+a 0 1 0 TeXcolorrgb Fx(5)p 0 1 0 TeXcolorrgb 2175 686
 a
 SDict begin H.R end
- 2175 714 a 2175 767 a
+ 2175 686 a 2175 739 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.clark99distributed) cvn H.B /ANN pdfmark end
- 2175 767 a Black Fx(,)p 0 1 0
-TeXcolorrgb 2198 767 a
+ 2175 739 a Black Fx(,)p 0 1 0
+TeXcolorrgb 2198 739 a
 SDict begin H.S end
- 2198 767 a 0 1 0 TeXcolorrgb Fx(13)p
-0 1 0 TeXcolorrgb 2281 714 a
+ 2198 739 a 0 1 0 TeXcolorrgb Fx(13)p
+0 1 0 TeXcolorrgb 2281 686 a
 SDict begin H.R end
- 2281 714 a 2281 767 a
+ 2281 686 a 2281 739 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.herlihy87how) cvn H.B /ANN pdfmark end
  2281
-767 a Black Fx(,)p 0 1 0 TeXcolorrgb 2304 767 a
+739 a Black Fx(,)p 0 1 0 TeXcolorrgb 2304 739 a
 SDict begin H.S end
  2304
-767 a 0 1 0 TeXcolorrgb Fx(27)p 0 1 0 TeXcolorrgb 2387
-714 a
+739 a 0 1 0 TeXcolorrgb Fx(27)p 0 1 0 TeXcolorrgb 2387
+686 a
 SDict begin H.R end
- 2387 714 a 2387 767 a
+ 2387 686 a 2387 739 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.waldman2001tangler) cvn H.B /ANN pdfmark end
- 2387 767 a Black Fx(,)p 0 1 0
-TeXcolorrgb 2410 767 a
+ 2387 739 a Black Fx(,)p 0 1 0
+TeXcolorrgb 2410 739 a
 SDict begin H.S end
- 2410 767 a 0 1 0 TeXcolorrgb Fx(28)p
-0 1 0 TeXcolorrgb 2493 714 a
+ 2410 739 a 0 1 0 TeXcolorrgb Fx(28)p
+0 1 0 TeXcolorrgb 2493 686 a
 SDict begin H.R end
- 2493 714 a 2493 767 a
+ 2493 686 a 2493 739 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.pub00) cvn H.B /ANN pdfmark end
  2493
-767 a Black Fx(].)i(The)g(prop)r(osed)f(proto)r(cols)523
-867 y(di\013er)33 b(in)f(v)-5 b(arious)32 b(asp)r(ects)g(unrelated)g
+739 a Black Fx(].)i(The)g(prop)r(osed)f(proto)r(cols)523
+839 y(di\013er)33 b(in)f(v)-5 b(arious)32 b(asp)r(ects)g(unrelated)g
 (to)g(the)h(sp)r(eci\014cs)f(of)h(the)f(enco)r(ding)g(mec)n(hanism,)523
-966 y(suc)n(h)23 b(as)g(con)n(ten)n(t)f(replication)h(and)g(the)h(use)f
+939 y(suc)n(h)23 b(as)g(con)n(ten)n(t)f(replication)h(and)g(the)h(use)f
 (of)g(anon)n(ymous)f(or)g(steganographic)f(comm)n(u-)523
-1066 y(nication.)29 b(Characteristic)g(of)g(all)h(of)f(these)h(systems)
-f(is)h(the)g(use)g(of)f(replication)g(and)h(the)523 1166
+1038 y(nication.)29 b(Characteristic)g(of)g(all)h(of)f(these)h(systems)
+f(is)h(the)g(use)g(of)f(replication)g(and)h(the)523 1138
 y(need)h(to)g(ensure)g(data)g(in)n(tegrit)n(y)-7 b(.)30
 b(F)-7 b(or)30 b(an)h(o)n(v)n(erview)e(of)i(con)n(ten)n(t)g
-(replication)f(strategies)523 1265 y(see)f([)p 0 1 0
-TeXcolorrgb 682 1265 a
+(replication)f(strategies)523 1237 y(see)f([)p 0 1 0
+TeXcolorrgb 682 1237 a
 SDict begin H.S end
- 682 1265 a 0 1 0 TeXcolorrgb Fx(6)p
-0 1 0 TeXcolorrgb 724 1212 a
+ 682 1237 a 0 1 0 TeXcolorrgb Fx(6)p
+0 1 0 TeXcolorrgb 724 1184 a
 SDict begin H.R end
- 724 1212 a 724 1265 a
+ 724 1184 a 724 1237 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.cohen02replication) cvn H.B /ANN pdfmark end
  724
-1265 a Black Fx(].)g(The)h(censorship-resistan)n(t)c(systems)j(all)g
+1237 a Black Fx(].)g(The)h(censorship-resistan)n(t)c(systems)j(all)g
 (use)g(some)g(form)g(of)g(con)n(ten)n(t)g(enco)r(ding)523
-1365 y(to)22 b(hide)h(the)f(sp)r(eci\014cs)g(of)h(the)f(con)n(ten)n(t)g
+1337 y(to)22 b(hide)h(the)f(sp)r(eci\014cs)g(of)h(the)f(con)n(ten)n(t)g
 (from)g(the)h(mac)n(hines)e(whic)n(h)h(are)g(storing)f(the)h(data.)523
-1546 y
+1495 y
 SDict begin H.S end
- 523 1546 a 523 1546 a
+ 523 1495 a 523 1495 a
 SDict begin 12 H.A end
- 523 1546 a 523 1546 a
+ 523 1495 a 523 1495 a
 SDict begin [ /View [/XYZ H.V] /Dest (subsection.1.2.1) cvn H.B /DEST
 pdfmark end
  523
-1546 a 88 x Fn(2.1)95 b(F)-8 b(reenet)523 1820 y Fx(Con)n(ten)n(t)30
+1495 a 83 x Fn(2.1)95 b(F)-8 b(reenet)523 1736 y Fx(Con)n(ten)n(t)30
 b(hash)f(k)n(eys)g(\(CHK\),)h(the)g(use)g(of)g(the)g(hash)f(of)h(the)g
-(con)n(ten)n(t)g(as)f(an)h(encryption)523 1920 y(k)n(ey)-7
+(con)n(ten)n(t)g(as)f(an)h(encryption)523 1836 y(k)n(ey)-7
 b(,)30 b(are)f(the)i(main)f(con)n(ten)n(t)g(enco)r(ding)g(sc)n(heme)g
 (used)g(in)g(F)-7 b(reenet)31 b([)p 0 1 0 TeXcolorrgb
-2739 1920 a
+2739 1836 a
 SDict begin H.S end
- 2739 1920 a 0 1 0 TeXcolorrgb Fx(5)p 0 1 0
-TeXcolorrgb 2780 1866 a
+ 2739 1836 a 0 1 0 TeXcolorrgb Fx(5)p 0 1 0
+TeXcolorrgb 2780 1782 a
 SDict begin H.R end
- 2780 1866 a 2780 1920 a
+ 2780 1782 a 2780 1836 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.clark99distributed) cvn H.B /ANN pdfmark end
  2780
-1920 a Black Fx(].)g(Using)f(the)g(hash)523 2019 y(of)h(the)h(con)n
+1836 a Black Fx(].)g(Using)f(the)g(hash)523 1936 y(of)h(the)h(con)n
 (ten)n(t)e(as)h(the)g(k)n(ey)g(ensures)f(that)i(indep)r(enden)n(t)g
-(encryptions)e(yield)h(the)h(same)523 2119 y(encrypted)i(data.)h(This)f
+(encryptions)e(yield)h(the)h(same)523 2035 y(encrypted)i(data.)h(This)f
 (is)h(useful)g(in)f(that)h(it)g(allo)n(ws)e(the)i(system)g(to)f(detect)
-h(iden)n(tical)523 2218 y(con)n(ten)n(t)26 b(ev)n(en)f(if)i(the)g(con)n
+h(iden)n(tical)523 2135 y(con)n(ten)n(t)26 b(ev)n(en)f(if)i(the)g(con)n
 (ten)n(t)e(originates)g(from)h(di\013eren)n(t)g(users.)f(In)i(order)d
-(to)i(do)n(wnload)523 2318 y(a)k(CHK-enco)r(ded)h(\014le,)g(the)g(user)
+(to)i(do)n(wnload)523 2234 y(a)k(CHK-enco)r(ded)h(\014le,)g(the)g(user)
 f(m)n(ust)h(kno)n(w)f(b)r(oth)h(the)g(hash)f(of)h(the)g(original)e(con)
-n(ten)n(t)523 2418 y(and)g(the)h(hash)f(of)h(the)g(encrypted)f(con)n
+n(ten)n(t)523 2334 y(and)g(the)h(hash)f(of)h(the)g(encrypted)f(con)n
 (ten)n(t.)g(The)h(hash)f(of)g(the)h(original)e(con)n(ten)n(t)h(allo)n
-(ws)523 2517 y(the)d(user)e(to)h(decrypt)g(the)g(data)g(and)g(to)g(v)n
+(ws)523 2434 y(the)d(user)e(to)h(decrypt)g(the)g(data)g(and)g(to)g(v)n
 (erify)f(the)i(in)n(tegrit)n(y)e(of)h(the)h(decrypted)e(con)n(ten)n(t)
-523 2617 y(afterw)n(ards.)33 b(The)i(hash)g(of)g(the)g(encrypted)g(con)
+523 2533 y(afterw)n(ards.)33 b(The)i(hash)g(of)g(the)g(encrypted)g(con)
 n(ten)n(t)f(is)h(used)g(as)f(the)h(query)f(b)n(y)h(whic)n(h)523
-2717 y(p)r(eers)27 b(\014nd)h(the)g(\(encrypted\))g(con)n(ten)n(t.)648
-2820 y(One)19 b(dra)n(wbac)n(k)e(of)i(F)-7 b(reenet's)19
+2633 y(p)r(eers)27 b(\014nd)h(the)g(\(encrypted\))g(con)n(ten)n(t.)648
+2733 y(One)19 b(dra)n(wbac)n(k)e(of)i(F)-7 b(reenet's)19
 b(use)g(of)g(CHKs)g(is)h(that)f(it)h(do)r(es)f(not)g(allo)n(w)f(direct)
-h(sharing)523 2920 y(of)j(\014les)g(from)f(the)i(lo)r(cal)e(driv)n(e)g
+h(sharing)523 2832 y(of)j(\014les)g(from)f(the)i(lo)r(cal)e(driv)n(e)g
 (without)i(hashing)e(and)h(encrypting)f(and)h(storing)e(a)i(cop)n(y)f
-(of)523 3019 y(the)h(en)n(tire)g(encrypted)f(\014le.)i(As)e(a)h
+(of)523 2932 y(the)h(en)n(tire)g(encrypted)f(\014le.)i(As)e(a)h
 (result,)g(a)f(no)r(de)h(op)r(erator)e(who)i(wishes)f(to)h(k)n(eep)f
-(con)n(ten)n(t)523 3119 y(directly)28 b(accessible)g(in)h(plain)n(text)
+(con)n(ten)n(t)523 3031 y(directly)28 b(accessible)g(in)h(plain)n(text)
 g(is)f(forced)g(to)h(k)n(eep)f(b)r(oth)h(a)g(cop)n(y)e(of)i(the)g
-(plain)n(text)g(as)523 3219 y(w)n(ell)e(as)g(the)h(encrypted)g(data)f
+(plain)n(text)g(as)523 3131 y(w)n(ell)e(as)g(the)h(encrypted)g(data)f
 (whic)n(h)g(w)n(ould)g(b)r(e)h(stored)f(in)h(the)g(F)-7
-b(reenet)28 b(database.)648 3322 y(Another)35 b(problem)g(with)h(using)
+b(reenet)28 b(database.)648 3231 y(Another)35 b(problem)g(with)h(using)
 f(CHK-enco)r(ding)f(on)i(en)n(tire)f(\014les)g(is)g(that)h(suc)n(h)f
-(an)523 3422 y(enco)r(ding)27 b(do)r(es)g(not)h(supp)r(ort)f(secure)g
+(an)523 3330 y(enco)r(ding)27 b(do)r(es)g(not)h(supp)r(ort)f(secure)g
 (sw)n(arming.)f(The)i(reason)e(for)h(this)g(is)h(that)g(a)f(clien)n(t)
-523 3522 y(can)38 b(only)g(v)n(erify)g(a)g(do)n(wnload)f(in)i(its)g(en)
+523 3430 y(can)38 b(only)g(v)n(erify)g(a)g(do)n(wnload)f(in)i(its)g(en)
 n(tiret)n(y)-7 b(.)38 b(Ho)n(w)n(ev)n(er,)f(in)h(an)h(op)r(en)f(p)r
-(eer-to-p)r(eer)523 3621 y(net)n(w)n(ork)19 b(whic)n(h)i(ma)n(y)f(con)n
+(eer-to-p)r(eer)523 3530 y(net)n(w)n(ork)19 b(whic)n(h)i(ma)n(y)f(con)n
 (tain)g(malicious)g(participan)n(ts)g(a)h(m)n(ulti-source)e(do)n
-(wnload)h(m)n(ust)523 3721 y(b)r(e)39 b(able)f(to)g(pin-p)r(oin)n(t)g
+(wnload)h(m)n(ust)523 3629 y(b)r(e)39 b(able)f(to)g(pin-p)r(oin)n(t)g
 (corruptions)f(on)h(a)f(smaller)h(scale.)f(Using)h(CHK-enco)r(ding)f
-(on)523 3820 y(en)n(tire)22 b(\014les)h(in)g(com)n(bination)e(with)j
+(on)523 3729 y(en)n(tire)22 b(\014les)h(in)g(com)n(bination)e(with)j
 (sw)n(arming)d(w)n(ould)h(allo)n(w)f(malicious)h(p)r(eers)g(to)h
-(corrupt)523 3920 y(large)37 b(do)n(wnloads)f(b)n(y)i(con)n(tributing)g
+(corrupt)523 3828 y(large)37 b(do)n(wnloads)f(b)n(y)i(con)n(tributing)g
 (only)f(a)h(few)g(corrupt)g(p)r(ortions)f(of)h(the)h(\014le.)f(The)523
-4020 y(receiv)n(er)26 b(w)n(ould)i(b)r(e)g(able)g(to)g(detect)g(the)h
+3928 y(receiv)n(er)26 b(w)n(ould)i(b)r(e)g(able)g(to)g(detect)g(the)h
 (corruption,)e(but)h(could)g(not)g(determine)g(whic)n(h)523
-4119 y(p)r(ortions)f(of)g(the)h(\014le)g(are)f(defectiv)n(e.)648
-4223 y(Finally)-7 b(,)30 b(F)-7 b(reenet)31 b(users)f(need)h(to)f
+4028 y(p)r(ortions)f(of)g(the)h(\014le)g(are)f(defectiv)n(e.)648
+4127 y(Finally)-7 b(,)30 b(F)-7 b(reenet)31 b(users)f(need)h(to)f
 (someho)n(w)g(obtain)g(the)h(t)n(w)n(o)f(hash)h(co)r(des)f(that)h(are)
-523 4323 y(needed)h(to)g(searc)n(h)f(and)h(decrypt)g(the)h(CHK)f(enco)r
+523 4227 y(needed)h(to)g(searc)n(h)f(and)h(decrypt)g(the)h(CHK)f(enco)r
 (ded)g(con)n(ten)n(t.)g(The)g(main)g(c)n(hallenges)523
-4422 y(in)e(this)g(con)n(text)g(is)f(to)h(k)n(eep)f(the)h(searc)n(h)e
+4327 y(in)e(this)g(con)n(text)g(is)f(to)h(k)n(eep)f(the)h(searc)n(h)e
 (for)i(CHK)f(enco)r(ded)h(con)n(ten)n(t)f(as)h(secure)f(as)g(the)523
-4522 y(CHK-enco)r(ded)e(con)n(ten)n(t)h(itself.)g(Sp)r(eci\014cally)-7
+4426 y(CHK-enco)r(ded)e(con)n(ten)n(t)h(itself.)g(Sp)r(eci\014cally)-7
 b(,)28 b(p)r(eers)f(should)h(not)g(b)r(e)g(able)f(to)h(determine)523
-4621 y(the)d(nature)g(of)g(the)g(query)g(or)f(the)h(resp)r(onse.)f
+4526 y(the)d(nature)g(of)g(the)g(query)g(or)f(the)h(resp)r(onse.)f
 (Ideally)-7 b(,)25 b(p)r(eers)f(should)h(also)f(not)h(b)r(e)g(able)g
-(to)523 4721 y(pro)r(duce)i(in)n(v)-5 b(alid)28 b(resp)r(onses.)648
-4825 y(F)-7 b(reenet)32 b(has)h(sev)n(eral)e(other)h(t)n(yp)r(es)h(of)g
+(to)523 4625 y(pro)r(duce)i(in)n(v)-5 b(alid)28 b(resp)r(onses.)648
+4725 y(F)-7 b(reenet)32 b(has)h(sev)n(eral)e(other)h(t)n(yp)r(es)h(of)g
 (k)n(eys)f(whic)n(h)h(are)f(used)h(to)f(refer)h(the)g(user)f(to)523
-4924 y(CHKs.)g(One)f(w)n(a)n(y)g(to)h(obtain)f(the)i(CHKs)e(of)h(a)g
+4825 y(CHKs.)g(One)f(w)n(a)n(y)g(to)h(obtain)f(the)i(CHKs)e(of)h(a)g
 (\014le)g(in)g(F)-7 b(reenet)32 b(is)g(to)f(searc)n(h)g(a)g(priv)-5
-b(ate)p Black Black eop end
+b(ate)523 4924 y(subspace.)28 b(A)h(subspace)e(con)n(tains)h(a)g(set)g
+(of)h(CHKs)f(that)g(ha)n(v)n(e)g(b)r(een)h(cryptographically)p
+Black Black eop end
 %%Page: 5 5
 TeXDict begin 5 4 bop 0 0 a
 SDict begin /product where{pop product(Distiller)search{pop pop pop
@@ -5920,85 +5922,83 @@
 end
  523 232 a Black 1036 w Fu(An)25
 b(Enco)r(ding)h(for)h(Censorship-Resistan)n(t)f(Sharing)238
-b(5)p Black 523 448 a Fx(subspace.)27 b(A)h(subspace)f(con)n(tains)f(a)
-i(set)f(of)h(CHK)f(k)n(eys)g(that)h(ha)n(v)n(e)e(b)r(een)i
-(cryptographi-)523 548 y(cally)e(signed)h(b)n(y)g(the)g(o)n(wner)f(of)h
-(the)g(subspace)g(and)f(placed)h(in)n(to)g(the)g(subspace)g(under)f(a)
-523 648 y(certain)21 b(k)n(eyw)n(ord.)e(These)i(signed)g(references)f
-(are)h(called)g(subspace-signed)e(k)n(eys)i(\(SSKs\).)523
-747 y(Giv)n(en)27 b(the)h(subspace-pre\014x)e(and)h(the)h(k)n(eyw)n
-(ord,)e(users)g(can)h(obtain)g(the)h(CHK)f(k)n(ey)-7
-b(.)27 b(Us-)523 847 y(ing)f(SSKs)h(prev)n(en)n(ts)e(p)r(eers)h(form)h
-(pro)r(ducing)f(in)n(v)-5 b(alid)26 b(resp)r(onses)g(but)h(shifts)g
-(the)g(burden)523 946 y(on)g(the)h(user)f(to)h(disco)n(v)n(er)d(in)n
-(teresting)i(subspaces.)648 1060 y(In)18 b(addition)g(to)h(CHKs)f(and)g
-(SSKs,)g(F)-7 b(reenet)18 b(supp)r(orts)g(k)n(eyw)n(ord)f(signed)h(k)n
-(eys)f(\(KSKs\).)523 1159 y(A)29 b(KSK)f(k)n(ey)g(in)g(F)-7
-b(reenet)29 b(is)f(essen)n(tially)g(a)g(CHK)g(stored)g(in)h(plain)n
-(text)f(\(!\))i(under)e(a)g(k)n(ey-)523 1259 y(w)n(ord.)c(The)g(proto)r
-(col)g(attempts)h(to)f(ensure)g(that)h(there)g(cannot)f(b)r(e)h(t)n(w)n
-(o)f(di\013eren)n(t)g(CHKs)523 1358 y(a)n(v)-5 b(ailable)25
-b(in)h(the)g(net)n(w)n(ork)f(under)h(the)g(same)f(k)n(eyw)n(ord.)f
-(While)j(collisions)e(for)g(KSKs)g(are)523 1458 y(supp)r(osedly)j(not)h
-(allo)n(w)n(ed,)e(the)j(proto)r(col)d(cannot)h(prev)n(en)n(t)g(them)h
-(from)g(o)r(ccurring:)e(net-)523 1558 y(w)n(ork)h(splits)i(and)f
-(malicious)g(p)r(eers)g(mak)n(e)g(it)h(imp)r(ossible)f(to)g(enforce)g
-(this)h(rule.)f(On)h(the)523 1657 y(other)i(hand,)g(if)h(an)f(attac)n
-(k)n(er)e(inserts)i(meaningless)f(data)h(under)g(a)g(common)g(k)n(eyw)n
-(ord,)523 1757 y(F)-7 b(reenet)28 b(will)h(try)f(to)g(preserv)n(e)f
-(that)i(con)n(ten)n(t)f(b)r(ecause)g(it)g(is)h(frequen)n(tly)f
-(requested.)g(F)-7 b(or)523 1857 y(these)38 b(reasons,)f(the)i(F)-7
-b(reenet)38 b(dev)n(elop)r(ers)f(consider)g(the)i(use)f(of)g(KSKs)g
-(insecure)f(and)523 1956 y(recommend)27 b(against)f(using)i(them.)648
-2069 y(As)h(a)f(result,)h(F)-7 b(reenet)29 b(e\013ectiv)n(ely)g(do)r
+b(5)p Black 523 448 a Fx(signed)21 b(b)n(y)g(the)g(o)n(wner)f(of)i(the)
+f(subspace)g(and)g(placed)g(in)n(to)g(the)g(subspace)g(under)g(a)g
+(certain)523 548 y(k)n(eyw)n(ord.)j(These)h(signed)g(references)f(are)g
+(called)h(subspace-signed)f(k)n(eys)h(\(SSKs\).)g(Giv)n(en)523
+648 y(the)35 b(subspace-pre\014x)f(and)h(the)g(k)n(eyw)n(ord,)e(users)h
+(can)h(obtain)f(the)i(CHK.)f(Using)f(SSKs)523 747 y(prev)n(en)n(ts)g(p)
+r(eers)h(form)h(pro)r(ducing)e(in)n(v)-5 b(alid)36 b(resp)r(onses)e
+(but)i(shifts)g(the)g(burden)f(on)h(the)523 847 y(user)27
+b(to)g(disco)n(v)n(er)f(in)n(teresting)h(subspaces.)648
+968 y(In)18 b(addition)g(to)h(CHKs)f(and)g(SSKs,)g(F)-7
+b(reenet)18 b(supp)r(orts)g(k)n(eyw)n(ord)f(signed)h(k)n(eys)f
+(\(KSKs\).)523 1067 y(A)27 b(KSK)g(in)g(F)-7 b(reenet)27
+b(is)f(essen)n(tially)g(a)h(CHK)g(stored)f(in)h(plain)n(text)g(\(!\))h
+(under)e(a)h(k)n(eyw)n(ord.)523 1167 y(The)e(proto)r(col)f(attempts)i
+(to)f(ensure)g(that)g(there)g(cannot)g(b)r(e)h(t)n(w)n(o)e(di\013eren)n
+(t)h(CHKs)g(a)n(v)-5 b(ail-)523 1266 y(able)39 b(in)i(the)f(net)n(w)n
+(ork)e(under)i(the)g(same)f(k)n(eyw)n(ord.)f(While)i(collisions)f(for)g
+(KSKs)g(are)523 1366 y(supp)r(osedly)28 b(not)h(allo)n(w)n(ed,)e(the)j
+(proto)r(col)d(cannot)h(prev)n(en)n(t)g(them)h(from)g(o)r(ccurring:)e
+(net-)523 1466 y(w)n(ork)h(splits)i(and)f(malicious)g(p)r(eers)g(mak)n
+(e)g(it)h(imp)r(ossible)f(to)g(enforce)g(this)h(rule.)f(On)h(the)523
+1565 y(other)i(hand,)g(if)h(an)f(attac)n(k)n(er)e(inserts)i
+(meaningless)f(data)h(under)g(a)g(common)g(k)n(eyw)n(ord,)523
+1665 y(F)-7 b(reenet)28 b(will)h(try)f(to)g(preserv)n(e)f(that)i(con)n
+(ten)n(t)f(b)r(ecause)g(it)g(is)h(frequen)n(tly)f(requested.)g(F)-7
+b(or)523 1765 y(these)38 b(reasons,)f(the)i(F)-7 b(reenet)38
+b(dev)n(elop)r(ers)f(consider)g(the)i(use)f(of)g(KSKs)g(insecure)f(and)
+523 1864 y(recommend)27 b(against)f(using)i(them.)648
+1985 y(As)h(a)f(result,)h(F)-7 b(reenet)29 b(e\013ectiv)n(ely)g(do)r
 (es)g(not)g(supp)r(ort)f(an)n(y)h(t)n(yp)r(e)g(of)g(k)n(eyw)n
-(ord-based)523 2169 y(searc)n(h.)22 b(The)i(CHK)g(k)n(eys)f(m)n(ust)h
-(b)r(e)g(found)g(b)n(y)g(using)g(external)f(k)n(eyserv)n(ers)e(or)i
-(ad-ho)r(c)g(ap-)523 2269 y(plications)30 b(built)h(up)r(on)f(the)h
-(basic)f(solution)g(b)n(y)g(using)g(incremen)n(tal)f(n)n(um)n(b)r(ers)h
-(as)g(parts)523 2368 y(of)c(k)n(eyw)n(ords)f(in)h(signed)g(namespaces.)
-f(F)-7 b(reenet)27 b(do)r(es)f(not)g(use)g(encryption)g(for)g(the)g
-(data)523 2468 y(stored)d(in)h(KSKs)f(or)g(SSKs)h(and)g(therefore)f
-(fails)g(to)h(prev)n(en)n(t)f(in)n(termediaries)g(from)g(learn-)523
-2567 y(ing)k(the)h(CHKs,)g(making)f(censorship)f(b)n(y)h(in)n
-(termediaries)g(easier.)523 2787 y
+(ord-based)523 2085 y(searc)n(h.)e(The)h(CHKs)g(m)n(ust)h(b)r(e)g
+(found)f(b)n(y)g(using)g(external)g(k)n(eyserv)n(ers)d(or)j(ad-ho)r(c)f
+(appli-)523 2184 y(cations)i(built)i(up)r(on)f(the)g(basic)g(solution)f
+(b)n(y)h(using)f(incremen)n(tal)g(n)n(um)n(b)r(ers)h(as)f(parts)g(of)
+523 2284 y(k)n(eyw)n(ords)k(in)i(signed)f(namespaces.)g(F)-7
+b(reenet)35 b(do)r(es)f(not)h(use)g(encryption)f(for)g(the)h(data)523
+2384 y(stored)23 b(in)h(KSKs)f(or)g(SSKs)h(and)g(therefore)f(fails)g
+(to)h(prev)n(en)n(t)f(in)n(termediaries)g(from)g(learn-)523
+2483 y(ing)k(the)h(CHKs,)g(making)f(censorship)f(b)n(y)h(in)n
+(termediaries)g(easier.)523 2733 y
 SDict begin H.S end
- 523 2787 a 523 2787
+ 523 2733 a 523 2733
 a
 SDict begin 12 H.A end
- 523 2787 a 523 2787 a
+ 523 2733 a 523 2733 a
 SDict begin [ /View [/XYZ H.V] /Dest (subsection.1.2.2) cvn H.B /DEST
 pdfmark end
- 523 2787 a 97 x Fn(2.2)95 b(T)-8
-b(angler)523 3118 y Fx(The)31 b(T)-7 b(angler)30 b(net)n(w)n(ork)f([)p
-0 1 0 TeXcolorrgb 1345 3118 a
+ 523 2733 a 105 x Fn(2.2)95 b(T)-8
+b(angler)523 3110 y Fx(The)31 b(T)-7 b(angler)30 b(net)n(w)n(ork)f([)p
+0 1 0 TeXcolorrgb 1345 3110 a
 SDict begin H.S end
- 1345 3118 a 0 1 0 TeXcolorrgb
-Fx(27)p 0 1 0 TeXcolorrgb 1428 3064 a
+ 1345 3110 a 0 1 0 TeXcolorrgb
+Fx(27)p 0 1 0 TeXcolorrgb 1428 3056 a
 SDict begin H.R end
- 1428 3064 a 1428
-3118 a
+ 1428 3056 a 1428
+3110 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.waldman2001tangler) cvn H.B /ANN pdfmark end
- 1428 3118 a Black Fx(])i(is)g(a)f(system)h(where)f(new)h(con)n
-(ten)n(t)g(is)g(en)n(tangled)f(with)h(old)523 3217 y(con)n(ten)n(t.)26
+ 1428 3110 a Black Fx(])i(is)g(a)f(system)h(where)f(new)h(con)n
+(ten)n(t)g(is)g(en)n(tangled)f(with)h(old)523 3210 y(con)n(ten)n(t.)26
 b(This)h(en)n(tanglemen)n(t)f(in)n(tro)r(duces)g(a)h(dep)r(endency)g
-(whic)n(h)f(mak)n(es)g(it)h(imp)r(ossible)523 3317 y(to)19
+(whic)n(h)f(mak)n(es)g(it)h(imp)r(ossible)523 3309 y(to)19
 b(retriev)n(e)e(a)h(piece)h(of)g(con)n(ten)n(t)f(if)i(the)f(other)f
 (con)n(ten)n(t)g(that)h(it)g(w)n(as)f(en)n(tangled)g(with)i(is)e(lost.)
-523 3416 y(While)i(this)h(mak)n(es)d(it)j(imp)r(ossible)e(to)h(censor)f
+523 3409 y(While)i(this)h(mak)n(es)d(it)j(imp)r(ossible)e(to)h(censor)f
 (sp)r(eci\014c)h(con)n(ten)n(t)f(without)h(losing)f(unrelated)523
-3516 y(con)n(ten)n(t)j(\(since)h(the)g(en)n(tanglemen)n(t)e(pairs)h
+3508 y(con)n(ten)n(t)j(\(since)h(the)g(en)n(tanglemen)n(t)e(pairs)h
 (are)g(c)n(hosen)f(randomly\),)h(this)h(pro)r(cess)e
-Fq(doubles)523 3616 y Fx(the)40 b(amoun)n(t)g(of)f(data)h(that)g(m)n
+Fq(doubles)523 3608 y Fx(the)40 b(amoun)n(t)g(of)f(data)h(that)g(m)n
 (ust)g(b)r(e)g(transp)r(orted)f(b)n(y)h(the)g(net)n(w)n(ork.)e(The)i
-(primary)523 3715 y(problem)25 b(with)h(the)h(sc)n(heme)e(is)g(the)i
+(primary)523 3708 y(problem)25 b(with)h(the)h(sc)n(heme)e(is)g(the)i
 (assumption)e(that)h(an)f(adv)n(ersary)e(w)n(ould)i(care)g(ab)r(out)523
-3815 y(the)34 b(loss)f(of)h(other)g(data)f(when)h(attempting)h(to)e
+3807 y(the)34 b(loss)f(of)h(other)g(data)f(when)h(attempting)h(to)e
 (censor)g(con)n(ten)n(t.)h(This)g(assumption)f(is)523
-3915 y(particularly)26 b(unrealistic)i(since)f(an)h(adv)n(ersary)d
+3907 y(particularly)26 b(unrealistic)i(since)f(an)h(adv)n(ersary)d
 (could)j(\014rst)f(mak)n(e)g(a)h(cop)n(y)f(of)g(imp)r(ortan)n(t)523
-4014 y(do)r(cumen)n(ts)h(and)f(re-insert)f(them)j(in)n(to)e(the)h
+4007 y(do)r(cumen)n(ts)h(and)f(re-insert)f(them)j(in)n(to)e(the)h
 (system)f(after)h(the)g(censorship)e(op)r(eration.)648
 4127 y(T)-7 b(angler)22 b(has)h(some)g(similarities)g(with)h(ECRS.)g
 (In)g(particular,)e(it)i(uses)f(hash)g(trees)h(for)523
@@ -6636,23 +6636,24 @@
 SDict begin [ /View [/XYZ H.V] /Dest (subsection.1.3.3) cvn H.B /DEST
 pdfmark end
  523 4090 a 79 x Fn(3.3)95 b Fg(IBlo)-5 b(cks)523
-4327 y Fx(F)e(or)32 b(\014les)h(larger)e(than)h(the)i(blo)r(c)n(ksize,)
-e(m)n(ultiple)h(CHK)f(k)n(eys)g(are)g(required)g(to)g(retriev)n(e)523
-4426 y(the)i(con)n(ten)n(t.)f(F)-7 b(or)33 b(example,)g(with)g(a)g(blo)
-r(c)n(ksize)g(of)g(32Kb)f(and)h(512-bit)g(hash)f(co)r(des,)h(a)523
-4526 y(32Mb)26 b(\014le)g(w)n(ould)g(b)r(e)h(split)f(in)n(to)h(1024)d
-Fq(DBlo)l(cks)p Fx(,)j Fp(B)2186 4538 y Fw(1)2223 4526
-y Fp(;)14 b(:)g(:)g(:)g(;)g(B)2471 4538 y Fw(1024)2607
-4526 y Fx(,)27 b(of)f(length)h(32Kb)e(eac)n(h.)523 4625
-y(Groups)e(of)g(up)h(to)f(256)f(CHKs)h(are)g(assem)n(bled)f(in)n(to)i
-(one)f(32Kb)f Fq(IBlo)l(ck)p Fx(,)j(resulting)e(in)g(four)523
-4725 y Fq(IBlo)l(ck)p Fx(s)j(for)f(the)g(32Mb)f(\014le.)i(The)f
-(resulting)f Fq(IBlo)l(ck)p Fx(s)i(are)e(CHK)h(encrypted)g(in)g(the)h
-(exact)523 4825 y(same)c(manner)h(as)f(the)h Fq(DBlo)l(cks)h
-Fx(and)f(their)g(CHK-k)n(eys)e(are)h(again)g(group)r(ed)g(in)n(to)h
-Fq(IBlo)l(cks)523 4924 y Fx(un)n(til)j(only)e(one)h(CHK)g(k)n(ey)g(is)g
-(left.)h(F)-7 b(or)24 b(the)i(32Mb)e(\014le,)i(the)f(CHKs)g(for)g(the)g
-(four)g Fq(IBlo)l(ck)p Fx(s)p Black Black eop end
+4327 y Fx(F)e(or)33 b(\014les)g(larger)e(than)j(the)f(blo)r(c)n(ksize,)
+g(m)n(ultiple)h(CHKs)f(are)f(required)g(to)i(retriev)n(e)e(the)523
+4426 y(con)n(ten)n(t.)26 b(F)-7 b(or)26 b(example,)g(with)h(a)f(blo)r
+(c)n(ksize)g(of)g(32Kb)f(and)h(512-bit)g(hash)g(co)r(des,)g(a)g(32Mb)
+523 4526 y(\014le)c(w)n(ould)f(b)r(e)g(split)h(in)n(to)f(1024)f
+Fq(DBlo)l(cks)p Fx(,)i Fp(B)1920 4538 y Fw(1)1957 4526
+y Fp(;)14 b(:)g(:)g(:)g(;)g(B)2205 4538 y Fw(1024)2341
+4526 y Fx(,)22 b(of)f(length)h(32Kb)e(eac)n(h.)h(Groups)523
+4625 y(of)j(up)g(to)g(256)e(CHKs)i(are)e(assem)n(bled)h(in)n(to)h(one)f
+(32Kb)g Fq(IBlo)l(ck)p Fx(,)i(resulting)e(in)i(four)e
+Fq(IBlo)l(ck)p Fx(s)523 4725 y(for)31 b(the)g(32Mb)f(\014le.)i(The)f
+(resulting)f Fq(IBlo)l(ck)p Fx(s)i(are)e(CHK)h(encrypted)g(in)h(the)f
+(exact)g(same)523 4825 y(manner)23 b(as)h(the)g Fq(DBlo)l(cks)h
+Fx(and)f(their)f(CHK-k)n(eys)g(are)g(again)g(group)r(ed)g(in)n(to)g
+Fq(IBlo)l(cks)j Fx(un)n(til)523 4924 y(only)g(one)h(CHK)f(is)h(left.)g
+(F)-7 b(or)26 b(the)h(32Mb)g(\014le,)f(the)i(CHKs)e(for)g(the)h(four)f
+Fq(IBlo)l(ck)p Fx(s)i(are)e(th)n(us)p Black Black eop
+end
 %%Page: 9 9
 TeXDict begin 9 8 bop 0 0 a
 SDict begin /product where{pop product(Distiller)search{pop pop pop
@@ -6670,43 +6671,42 @@
 end
  523 232 a Black 1036 w Fu(An)25
 b(Enco)r(ding)h(for)h(Censorship-Resistan)n(t)f(Sharing)238
-b(9)p Black 523 448 a Fx(are)25 b(th)n(us)h(collected)g(in)h(one)f
-(\014nal)g(top)g Fq(IBlo)l(ck)p Fx(.)h(The)f(additional)g(space)g
-(requiremen)n(ts)f(for)523 548 y(enco)r(ding)i(the)h(\014le)g(are)f(t)n
-(ypically)g(less)g(than)g(1\045)h(of)f(the)h(original)e(\014le)i(size.)
-523 739 y
+b(9)p Black 523 448 a Fx(collected)23 b(in)h(one)f(\014nal)h(top)f
+Fq(IBlo)l(ck)p Fx(.)i(The)f(additional)f(space)g(requiremen)n(ts)f(for)
+h(enco)r(ding)523 548 y(the)28 b(\014le)g(are)e(t)n(ypically)h(less)h
+(than)f(1\045)h(of)f(the)h(original)e(\014le)i(size.)523
+739 y
 SDict begin H.S end
  523 739 a 523 739 a
 SDict begin 12 H.A end
  523 739 a 523 739 a
 SDict begin [ /View [/XYZ H.V] /Dest (subsection.1.3.4) cvn H.B /DEST
 pdfmark end
- 523
-739 a 90 x Fn(3.4)95 b(Finding)30 b(\014les)523 1026
-y Fx(The)35 b(CHK)h(enco)r(ding)e(describ)r(ed)i(so)e(far)h(is)g
-(useful)h(for)f(transmitting)g(con)n(ten)n(t)g(that)g(is)523
-1126 y(enco)r(ded)e(and)h(y)n(et)f(v)n(eri\014able)f(for)h(in)n
-(termediaries.)f(Ho)n(w)n(ev)n(er,)f(a)i(practical)g(\014le-sharing)523
-1226 y(sc)n(heme)28 b(needs)h(to)f(pro)n(vide)g(functionalit)n(y)g(suc)
-n(h)h(that)f(the)h(users)f(can)g(obtain)h(the)g(query)523
-1325 y(hash)k(and)g(the)h(k)n(ey)e(that)i(are)e(no)n(w)h(necessary)e
-(in)j(order)d(to)j(retriev)n(e)e(and)h(decrypt)g(the)523
-1425 y(enco)r(ded)f(con)n(ten)n(t.)g(While)h(out-of-band)e(comm)n
-(unication)h(of)g(those)g(CHK)g(k)n(eys)f(is)h(cer-)523
-1524 y(tainly)22 b(feasible,)g(an)g(in)n(tegrated)f(solution)g(is)h
-(clearly)f(desirable.)g(Related)h(w)n(ork)f(on)h(secure)523
-1624 y(indexing)28 b([)p 0 1 0 TeXcolorrgb 881 1624 a
+ 523 739
+a 90 x Fn(3.4)95 b(Finding)30 b(\014les)523 1026 y Fx(The)35
+b(CHK)h(enco)r(ding)e(describ)r(ed)i(so)e(far)h(is)g(useful)h(for)f
+(transmitting)g(con)n(ten)n(t)g(that)g(is)523 1126 y(enco)r(ded)e(and)h
+(y)n(et)f(v)n(eri\014able)f(for)h(in)n(termediaries.)f(Ho)n(w)n(ev)n
+(er,)f(a)i(practical)g(\014le-sharing)523 1226 y(sc)n(heme)28
+b(needs)h(to)f(pro)n(vide)g(functionalit)n(y)g(suc)n(h)h(that)f(the)h
+(users)f(can)g(obtain)h(the)g(query)523 1325 y(hash)k(and)g(the)h(k)n
+(ey)e(that)i(are)e(no)n(w)h(necessary)e(in)j(order)d(to)j(retriev)n(e)e
+(and)h(decrypt)g(the)523 1425 y(enco)r(ded)c(con)n(ten)n(t.)g(While)h
+(out-of-band)e(comm)n(unication)g(of)h(those)g(CHKs)g(is)g(certainly)
+523 1524 y(feasible,)j(an)g(in)n(tegrated)g(solution)f(is)i(clearly)e
+(desirable.)g(Related)i(w)n(ork)e(on)h(secure)f(in-)523
+1624 y(dexing)k([)p 0 1 0 TeXcolorrgb 819 1624 a
 SDict begin H.S end
-
-881 1624 a 0 1 0 TeXcolorrgb Fx(10)p 0 1 0 TeXcolorrgb
-964 1571 a
+ 819
+1624 a 0 1 0 TeXcolorrgb Fx(10)p 0 1 0 TeXcolorrgb 902
+1571 a
 SDict begin H.R end
- 964 1571 a 964 1624 a
+ 902 1571 a 902 1624 a
 SDict begin [ /Color [0 1 0] /H /I /Border [0 0 0] /Subtype /Link /Dest
 (cite.secure2004goh) cvn H.B /ANN pdfmark end
- 964 1624 a Black Fx(])h(allo)n(ws)e
-(serv)n(ers)g(to)h(retriev)n(e)g(do)r(cumen)n(ts)g(b)n(y)g(k)n(eyw)n
-(ord)f(without)i(learning)523 1724 y(ab)r(out)g(the)g(rest)g(of)g(the)g
+ 902 1624 a Black Fx(])h(allo)n(ws)e(serv)n
+(ers)f(to)j(retriev)n(e)e(do)r(cumen)n(ts)h(b)n(y)h(k)n(eyw)n(ord)d
+(without)j(learning)523 1724 y(ab)r(out)29 b(the)g(rest)g(of)g(the)g
 (do)r(cumen)n(t.)g(The)g(sc)n(heme)g(describ)r(ed)g(in)g(this)g
 (section)g(impro)n(v)n(es)523 1823 y(on)h(this)g(b)n(y)g(k)n(eeping)g
 (the)g(k)n(eyw)n(ord)f(itself)h(priv)-5 b(ate.)30 b(Additionally)-7
@@ -6719,37 +6719,37 @@
 (arbitrary)d(participan)n(ts)h(to)h(access)g(same)f(encrypted)523
 2222 y(con)n(ten)n(t)27 b(\(as)g(long)g(as)g(they)h(are)f(able)g(to)g
 (obtain)h(or)e(guess)h(the)h(necessary)e(k)n(eyw)n(ord\).)648
-2328 y(The)e(k)n(ey)g(problem)g(for)g(the)h(searc)n(h)e(is)h(that)h
-(simply)f(publishing)h(CHK)f(k)n(eys)g(in)g(plain-)523
-2427 y(text)36 b(under)g(certain)f(k)n(eyw)n(ords)f(\(as)h(done)h(in)g
-(F)-7 b(reenet)35 b(with)i(KSK)e(k)n(eys\))g(has)g(v)-5
-b(arious)523 2527 y(dra)n(wbac)n(ks.)24 b(First,)i(in)n(termediaries)f
-(w)n(ould)h(learn)g(ab)r(out)g(the)g(CHK)h(k)n(eys)e(that)i(they)f(are)
-523 2627 y(storing)i(or)g(transmitting,)h(whic)n(h)h(could)f(allo)n(w)f
-(them)h(to)g(easily)g(censor)f(searc)n(h)f(results.)523
-2726 y(Second,)36 b(the)g(k)n(eyw)n(ords)d(are)i(directly)h(exp)r(osed)
-f(to)h(the)g(in)n(termediaries,)e(whic)n(h)i(again)523
-2826 y(w)n(ould)31 b(facilitate)f(censorship.)g(Finally)-7
-b(,)31 b(p)r(eers)g(w)n(ould)f(b)r(e)i(able)e(to)h(send)g(in)n(v)-5
-b(alid)31 b(replies)523 2926 y(that)37 b(refer)f(to)h(inappropriate)e
-(con)n(ten)n(t.)h(This)h(ma)n(y)f(b)r(e)h(just)g(a)g(n)n(uisance)f(if)h
-(malicious)523 3025 y(p)r(eers)c(use)g(this)h(for)f(adv)n(ertising)f
-(\(a)h(kind)h(of)f(b)r(eha)n(vior)g(can)g(b)r(e)h(observ)n(ed)d(on)j
-(gn)n(utella)523 3125 y(from)c(time)h(to)g(time\).)h(P)n(ossibly)c(w)n
-(orse,)i(if)h(a)f(net)n(w)n(ork)f(w)n(an)n(ts)h(to)g(economically)g
-(rew)n(ard)523 3224 y(p)r(eers)24 b(for)f(returning)h(searc)n(h)e
-(results,)i(the)g(p)r(ossibilit)n(y)g(of)g(returning)g(arbitrary)e
-(nonsense)523 3324 y(migh)n(t)28 b(mak)n(e)e(suc)n(h)i(incen)n(tiv)n(e)
-f(sc)n(hemes)g(impractical.)648 3430 y(W)-7 b(e)32 b(will)g(no)n(w)f
-(describ)r(e)h(ho)n(w)f(information)g(ab)r(out)h(CHK)g(k)n(eys)f(that)h
-(are)f(necessary)523 3530 y(to)24 b(retriev)n(e)e(a)h(\014le)h(can)f(b)
-r(e)h(obtained)f(b)n(y)h(searc)n(hing)d(using)j(natural)e(language)g
-Fq(keywor)l(ds)j Fx({)523 3629 y(without)e(rev)n(ealing)e(the)i(k)n
-(eyw)n(ords)e(to)i(in)n(termediaries.)e(Searc)n(hing)h(requires)f(the)i
-(con)n(ten)n(t)523 3729 y(pro)n(vider)30 b(to)h(supply)g(metadata)f(ab)
-r(out)h(the)h(\014le;)f(in)h(particular,)d(the)j(con)n(ten)n(t)f(pro)n
-(vider)523 3828 y(m)n(ust)e(supply)g(a)g(list)g(of)g(k)n(eyw)n(ords.)e
-(While)j(the)g(metadata)e(is)h(published)h(as)e(part)h(of)g(the)523
+2328 y(The)h(k)n(ey)f(problem)h(for)f(the)i(searc)n(h)d(is)i(that)h
+(simply)f(publishing)g(CHKs)g(in)g(plain)n(text)523 2427
+y(under)g(certain)f(k)n(eyw)n(ords)f(\(as)i(done)g(in)g(F)-7
+b(reenet)27 b(with)h(KSKs\))e(has)g(v)-5 b(arious)26
+b(dra)n(wbac)n(ks.)523 2527 y(First,)d(in)n(termediaries)e(w)n(ould)i
+(learn)f(ab)r(out)h(the)g(CHKs)f(that)h(they)h(are)d(storing)h(or)g
+(trans-)523 2627 y(mitting,)j(whic)n(h)f(could)f(allo)n(w)g(them)i(to)f
+(easily)f(censor)g(searc)n(h)f(results.)i(Second,)g(the)g(k)n(ey-)523
+2726 y(w)n(ords)33 b(are)g(directly)h(exp)r(osed)g(to)g(the)g(in)n
+(termediaries,)f(whic)n(h)h(again)f(w)n(ould)h(facilitate)523
+2826 y(censorship.)28 b(Finally)-7 b(,)30 b(p)r(eers)f(w)n(ould)g(b)r
+(e)h(able)f(to)g(send)h(in)n(v)-5 b(alid)29 b(replies)g(that)h(refer)f
+(to)g(in-)523 2926 y(appropriate)d(con)n(ten)n(t.)i(This)g(ma)n(y)f(b)r
+(e)h(just)h(a)e(n)n(uisance)g(if)i(malicious)e(p)r(eers)h(use)f(this)i
+(for)523 3025 y(adv)n(ertising)d(\(a)g(kind)i(of)f(b)r(eha)n(vior)e
+(can)i(b)r(e)g(observ)n(ed)f(on)h(gn)n(utella)f(from)h(time)g(to)g
+(time\).)523 3125 y(P)n(ossibly)32 b(w)n(orse,)f(if)j(a)e(net)n(w)n
+(ork)g(w)n(an)n(ts)g(to)h(economically)f(rew)n(ard)f(p)r(eers)i(for)g
+(returning)523 3224 y(searc)n(h)c(results,)h(the)h(p)r(ossibilit)n(y)g
+(of)f(returning)g(arbitrary)f(nonsense)h(migh)n(t)g(mak)n(e)g(suc)n(h)
+523 3324 y(incen)n(tiv)n(e)d(sc)n(hemes)g(impractical.)648
+3430 y(W)-7 b(e)32 b(will)g(no)n(w)f(describ)r(e)h(ho)n(w)f
+(information)g(ab)r(out)h(CHK)g(k)n(eys)f(that)h(are)f(necessary)523
+3530 y(to)24 b(retriev)n(e)e(a)h(\014le)h(can)f(b)r(e)h(obtained)f(b)n
+(y)h(searc)n(hing)d(using)j(natural)e(language)g Fq(keywor)l(ds)j
+Fx({)523 3629 y(without)e(rev)n(ealing)e(the)i(k)n(eyw)n(ords)e(to)i
+(in)n(termediaries.)e(Searc)n(hing)h(requires)f(the)i(con)n(ten)n(t)523
+3729 y(pro)n(vider)30 b(to)h(supply)g(metadata)f(ab)r(out)h(the)h
+(\014le;)f(in)h(particular,)d(the)j(con)n(ten)n(t)f(pro)n(vider)523
+3828 y(m)n(ust)e(supply)g(a)g(list)g(of)g(k)n(eyw)n(ords.)e(While)j
+(the)g(metadata)e(is)h(published)h(as)e(part)h(of)g(the)523
 3928 y Fq(KBlo)l(ck)g Fx(and)e(made)g(a)n(v)-5 b(ailable)26
 b(to)i(the)f(recipien)n(t)g(the)h(k)n(eyw)n(ords)e(are)g(only)h(used)g
 (to)h(com-)523 4028 y(pute)j(the)g Fq(KBlo)l(ck)p Fx(s)g(and)f(not)g

Modified: GNUnet-docs/papers/ecrs/main.tex
===================================================================
--- GNUnet-docs/papers/ecrs/main.tex    2006-11-14 00:11:07 UTC (rev 3756)
+++ GNUnet-docs/papers/ecrs/main.tex    2006-11-14 02:06:59 UTC (rev 3757)
@@ -340,16 +340,16 @@
 
 Freenet has several other types of keys which are used to refer the
 user to CHKs.  One way to obtain the CHKs of a file in Freenet is to
-search a private subspace.  A subspace contains a set of CHK keys that
+search a private subspace.  A subspace contains a set of CHKs that
 have been cryptographically signed by the owner of the subspace and
 placed into the subspace under a certain keyword.  These signed
 references are called subspace-signed keys (SSKs).  Given the
-subspace-prefix and the keyword, users can obtain the CHK key.  Using
+subspace-prefix and the keyword, users can obtain the CHK.  Using
 SSKs prevents peers form producing invalid responses but shifts the
 burden on the user to discover interesting subspaces. 
 
 In addition to CHKs and SSKs, Freenet supports keyword signed keys
-(KSKs).  A KSK key in Freenet is essentially a CHK stored in plaintext
+(KSKs).  A KSK in Freenet is essentially a CHK stored in plaintext
 (!) under a keyword.  The protocol attempts to ensure that there
 cannot be two different CHKs available in the network under the same
 keyword.  While collisions for KSKs are supposedly not allowed, the
@@ -361,7 +361,7 @@
 of KSKs insecure and recommend against using them.
 
 As a result, Freenet effectively does not support any type of
-keyword-based search.  The CHK keys must be found by using external
+keyword-based search.  The CHKs must be found by using external
 keyservers or ad-hoc applications built upon the basic solution by
 using incremental numbers as parts of keywords in signed
 namespaces. Freenet does not use encryption for the data stored in
@@ -572,14 +572,14 @@
 
 \subsection{{\em IBlocks}} \label{iblocks} % CHK+Tree
 
-For files larger than the blocksize, multiple CHK keys are required to
+For files larger than the blocksize, multiple CHKs are required to
 retrieve the content.  For example, with a blocksize of 32Kb and
 512-bit hash codes, a 32Mb file would be split into 1024 {\em
 DBlocks}, $B_1, \ldots, B_{1024}$, of length 32Kb each.  Groups of up
 to 256 CHKs are assembled into one 32Kb {\em IBlock}, resulting in
 four {\em IBlock}s for the 32Mb file. The resulting {\em IBlock}s are
 CHK encrypted in the exact same manner as the {\em DBlocks} and their
-CHK-keys are again grouped into {\em IBlocks} until only one CHK key
+CHK-keys are again grouped into {\em IBlocks} until only one CHK
 is left.  For the 32Mb file, the CHKs for the four {\em IBlock}s are
 thus collected in one final top {\em IBlock}.  The additional space
 requirements for encoding the file are typically less than 1\% of the
@@ -593,7 +593,7 @@
 practical file-sharing scheme needs to provide functionality such that
 the users can obtain the query hash and the key that are now necessary
 in order to retrieve and decrypt the encoded content.  While
-out-of-band communication of those CHK keys is certainly feasible, an
+out-of-band communication of those CHKs is certainly feasible, an
 integrated solution is clearly desirable.  Related work on secure
 indexing~\cite{secure2004goh} allows servers to retrieve documents by
 keyword without learning about the rest of the document.  The scheme
@@ -605,10 +605,10 @@
 permitting arbitrary participants to access same encrypted content (as
 long as they are able to obtain or guess the necessary keyword).
 
-The key problem for the search is that simply publishing CHK keys in
-plaintext under certain keywords (as done in Freenet with KSK keys)
+The key problem for the search is that simply publishing CHKs in
+plaintext under certain keywords (as done in Freenet with KSKs)
 has various drawbacks.  First, intermediaries would learn about the
-CHK keys that they are storing or transmitting, which could allow them
+CHKs that they are storing or transmitting, which could allow them
 to easily censor search results.  Second, the keywords are directly
 exposed to the intermediaries, which again would facilitate
 censorship.  Finally, peers would be able to send invalid replies that





reply via email to

[Prev in Thread] Current Thread [Next in Thread]