The important concept is that the top

發表於 2023-4-13 17:35:40 | 顯示全部樓層 |閱讀模式
To generate this fingerprint, we apply a mathematical function to produce a value known as a cryptographic hash. It’s impossible to generate an identical hash value using any other file or method   theoretically it’s possible, but the time required is longer than the current age of the Universe  . And the nature of a cryptographic hash is such that it can’t be used to re-create the document’s content. Guardtime organises the hash values of multiple documents into a structure known as a Merkle tree.
The combined hash values of all the documents in the Merkle tree are used to compute a single hash value which is assigned to the root of the tree, the top level hash. Note that diagrams of Merkle trees may depict the root of the tree at the top or the bottom. level hash is the root of the tree. It is mathematically linked to all the other hashes in the tree Latest Mailing Database in such a way that you can verify your document’s integrity as long as you have: the sealed document access to the top level hash AND trust in its validity.

Your access to the top level hash depends on whether or not you store your documents in the Scrive E-archive, as explained below. VERIFYING A SCRIVE DOCUMENT For up to days after your document is sealed, regardless of where you store it, you need to verify it with Guardtime, or with Scrive using our online verification tool at https:scriveverify. However, if you store your document in the Scrive E-archive during this period, afterwards you will also be able to verify it % independently of Scrive and Guardtime.   


使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊



Copyright © 2022 188SPORT體育論壇 All Rights Reserved.

Powered by Discuz!

快速回復 返回頂部 返回列表