2015
DOI: 10.1007/s00453-014-9968-3
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Hash Tables Based on Cryptographic Accumulators

Abstract: Suppose a client stores n elements in a hash table that is outsourced to an untrusted server. We address the problem of authenticating the hash table operations, where the goal is to design protocols capable of verifying the correctness of queries and updates performed by the server, thus ensuring the integrity of the remotely stored data across its entire update history. Solutions to this authentication problem allow the client to gain trust in the operations performed by a faulty or even malicious server tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 48 publications
(82 reference statements)
0
9
0
Order By: Relevance
“…However, in 2008Papamanthou et al (2008 propose a cryptographic construction based on RSA accumulators which exploits the efficiency of hash tables. In 2009, the same authors (in Papamanthou et al, 2015Papamanthou et al, , published in 2015 proposed to combine the RSA accumulator with a pairing one in a nested way over a tree of constant depth. Asymptotically the client can optimally authenticate operations on hash tables c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 5 ) 1 e1 2 with constant time and communication complexities.…”
Section: Accumulator Based Authenticated Dictionarymentioning
confidence: 95%
“…However, in 2008Papamanthou et al (2008 propose a cryptographic construction based on RSA accumulators which exploits the efficiency of hash tables. In 2009, the same authors (in Papamanthou et al, 2015Papamanthou et al, , published in 2015 proposed to combine the RSA accumulator with a pairing one in a nested way over a tree of constant depth. Asymptotically the client can optimally authenticate operations on hash tables c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 5 ) 1 e1 2 with constant time and communication complexities.…”
Section: Accumulator Based Authenticated Dictionarymentioning
confidence: 95%
“…Another approach is proposed by Papamanthou et al, where an efficient authenticated hash table is introduced, allowing the repository to outsource storage and search computation costs to a third party, while still verifying answers to membership queries are correct. However, this would require network communication to obtain the integrity metadata before verifying any object, severely hindering performance of object verification.…”
Section: Related Workmentioning
confidence: 99%
“…We note that range query is not to be confused with range proof [8] where the goal is to prove that the committed value lies in a specified integer range without revealing it. Authenticated data structures (ADS) [14,21,35,36,38,42] are often set in the three party model with a trusted owner, a trusted client and a malicious server; the owner outsources the data to the server and later the client interacts with the server to run queries on the data. The security requirement of such constructions is data authenticity for the client against the server.…”
Section: Related Workmentioning
confidence: 99%