COMP2300_Week10quiz

.pdf

School

Macquarie University *

*We aren’t endorsed by this school

Course

2300

Subject

Computer Science

Date

May 8, 2024

Type

pdf

Pages

2

Uploaded by DrNightingale4112 on coursehero.com

COMP 2300 Applied Cryptography Week 10 Quiz Q1. The blockchain in Bitcoin solves the double spend problem because: a. We can check if there is a past transaction in the blockchain consuming the coin b. There is a central authority maintaining the blockchain c. Every node has a local copy of all transactions added to the blockchain so far. Ans: (a) We can check if there is a past transaction in the blockchain consuming the coin Q2. A malicious Alice cannot deny service to Bob by not adding any of his transactions to the block proposed by her, because: a. Some other honest nodes in a later round will add Bob's transactions into their proposed block b. Alice cannot forge Bob's signature Ans: (a) Some other honest nodes in a later round will add Bob's transactions into their proposed block Q3. Double spending attack is hard to carry out on cash-based fiat currencies because: a. There is a serial number attached to every note b. There is a blockchain recording every cash transaction c. It is hard to counterfeit notes without getting caught Ans: (c) It is hard to counterfeit notes without getting caught Q4. The two mechanisms to incentivize honest behavior in Bitcoin are: a. Transaction fees b. Rewarding 100 Bitcoins c. Block reward d. Penalizing malicious behavior Ans: (a) Transaction fees & (c) Block reward
Q5. Suppose we have two coins with outcomes heads or tails. Coin A comes out head with probability 0.5. Coin B comes out head with probability 0.4. Which coin has higher min- entropy? a. Coin B b. Coin A Ans: (b) Coin A Q6. Let X be a random variable denoting the outcomes of a fair dice. What is the min- entropy of X? Ans: (2.5489) Q7. In blind signatures, the signer can sign messages without knowing the contents of the message. Select one: TRUE or FALSE Ans: (True) Q8. One can always check by verifying signatures if one of the two transactions in a double- spend attack is a double-spend transaction. Select one: TRUE or FALSE Ans: (False) Q9. In a Sybil attack, the attacker creates a single node with high computing power for Bitcoin mining. Select one: TRUE or FALSE Ans: (False)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help