BHT security
as secure as the chained hash function
max attacker gain
- doubles accessible value / hash
- 1025 years for lone attacker?
- …collusion or arbitrage far easier
usual caveats about due care:
- randomness of seed
- security of announcements and set up messages
- (SDP & SSL-based example in paper)