... 2)[R1,R4]>[R3,W4,W3] >ti[R2,R1,R3] [R1,R4] [R1,R4] [R3,W4,W3] [R1,R4] [R1,R4]<(m − i)[R2,R1,R3]; <(m − 2)[R1,R4]>[R3,W4,W3] >...........................tm−1[R2,R1,R3] ... a single point of attack. (2) The amount of information to storegrows exponentially with the size of the system and centralized systems cannotsustain storing a growing amount of data at a user ... University, CA, USAMoni NaorWeizmann Institute of Science, Rehovot, IsraelOscar NierstraszUniversity of Bern, SwitzerlandC. Pandu RanganIndian Institute of Technology, Madras, IndiaBernhard...