2003
DOI: 10.3233/jcs-2003-11302
|View full text |Cite
|
Sign up to set email alerts
|

Authentic data publication over the Internet1

Abstract: Integrity critical databases, such as financial information used in high-value decisions, are frequently published over the Internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of clients. Providing this protection over public data networks is an expensive proposition. This is, in part, due to the difficulty of building and running secure systems. In practice, large systems can not be verified to be secure and are frequently penetrated. The negative conse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
132
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 130 publications
(134 citation statements)
references
References 22 publications
2
132
0
Order By: Relevance
“…We compare three different range query verification methods, Authentic Publication proposed by Devanbu, et al in [6], Pang and Tan's verifiable B-tree (VB tree) in [17] and the proposals in this paper. We focus on Client proof overhead and verification cost and then consider the effect of bandwidth.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…We compare three different range query verification methods, Authentic Publication proposed by Devanbu, et al in [6], Pang and Tan's verifiable B-tree (VB tree) in [17] and the proposals in this paper. We focus on Client proof overhead and verification cost and then consider the effect of bandwidth.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…A HAT is just a binary search tree with data stored at the leaves, along with a digest procedure that incorporates a fast collision intractable hash function h and an accumulator H. We want to take advantage of the input reordering allowed by an accumulator to avoid checking the entire hash path to the root as done when using Merkle trees as in Authentic Publication [6] and related schemes. However, accumulators have larger output, typically near the 1024 bits of an RSA modulus compared to the 160 bit output of SHA-1, and take longer to verify a value y i against a proof z i for a set value z.…”
Section: Breaking the Dependence On Tree Heightmentioning
confidence: 99%
See 3 more Smart Citations