Attacks on verification keys
Last updated
Last updated
As discussed in the verification key generation, colluding attackers may know a set of used keys, then use these keys to predict the next keys (this is called random number generator attack [20]). Furthermore, a large enough set of workers may also temporarily saturate the rendering task assignment mechanism of the manager to control which nodes will be assigned\cite{Lian2007}. These nodes already know the verification keys used for the assigned tasks, then they generate straightforwardly forged images which validate the noise verification. In short, once the verification key generation is predictable, the noise verification will be compromised.
This attack is mitigated due the cryptographic hash property of : knowledge about generated keys does not leak any information about the next keys.