Compare and contrast the two solutions presented under topic "Secure database outsourcing: Authentication and integrity" (slides 20-23), based on the article "Authentication and Integrity in Outsourced Databases". The first solution is based on MACs and the second solution is based on digital signatures. Your comparison should consider the costs of the two solutions (communication, storage, processing) and the functionality provided by them.