- Aug 28, 2015
- 517
- 1,679
Let's say hypothetically that I have a list of parties who have supplied me with a random hash, C. Say generated like thus:
C=sha256(B) where b is a random generated number.
But let's say that actually what each party does is this:
B=sha256(A)
C=sha256(B)
I think I am correct in thinking that if all parties supply me with C, that I can verify their legitimacy in a cryptographically secure way if the party subsequently reveals to me B?
What I want to know is: if later I require further proof of legitimate origin from the same party but now B is public (say because broadcast across a network) then if the party reveals A is this also cryptographically secure?
i.e. is a chain of hashes which are sequentially revealed insecure?
PS. Over to you Peter R )
C=sha256(B) where b is a random generated number.
But let's say that actually what each party does is this:
B=sha256(A)
C=sha256(B)
I think I am correct in thinking that if all parties supply me with C, that I can verify their legitimacy in a cryptographically secure way if the party subsequently reveals to me B?
What I want to know is: if later I require further proof of legitimate origin from the same party but now B is public (say because broadcast across a network) then if the party reveals A is this also cryptographically secure?
i.e. is a chain of hashes which are sequentially revealed insecure?
PS. Over to you Peter R )
Last edited: