2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497478
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(29 citation statements)
references
References 1 publication
0
29
0
Order By: Relevance
“…2 Then we present an authenticated dictionary data structure that is based on a new cryptographic primitive that was recently proposed by Silverberg and Boneh, namely multilinear forms [10], the construction of which remains however an open problem to date. The use of such a primitive gives an authenticated dictionary with constant communication and constant verification complexity, while maintaining all other complexities logarithmic.…”
Section: Introductionmentioning
confidence: 99%
“…2 Then we present an authenticated dictionary data structure that is based on a new cryptographic primitive that was recently proposed by Silverberg and Boneh, namely multilinear forms [10], the construction of which remains however an open problem to date. The use of such a primitive gives an authenticated dictionary with constant communication and constant verification complexity, while maintaining all other complexities logarithmic.…”
Section: Introductionmentioning
confidence: 99%
“…In ADS, a trusted source outsources the data or a data structure, and the client wishes to verify the correctness of the result of a data structure query, e.g., dictionaries [19,28], graphs [21,27] and hash tables [32,37]. Most authenticated data structures schemes incur logarithmic or linear overheads for verification costs, with some exceptions being authenticated range queries [2,20] and set operations [33], where verification takes time proportional to the size of the answer. Verifiable computation in the secret key setting (SVC).…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, let S denote the multiset corresponding to that coefficient. 2 Suppose the current function public key is FK(f ).…”
Section: Detailed Constructionmentioning
confidence: 99%
“…The above schemes cannot be applied to our model, since we assume that the DO and the client are separate entities, and that the clients are not trusted. Atallah et al [2] introduce a theoretical approach that provides lower asymptotic bounds for the VO size than MH-based techniques.…”
Section: Related Workmentioning
confidence: 99%
“…The function takes the same arguments as InsertDPM, where r is now the record to be deleted. DeleteDPM first traverses the tree until reaching the leaf N that accommodates r (lines [1][2][3][4]. If N is the root, or its sibling (denoted by N.sb) is not a leaf, the procedure simply deletes r from TMH-Tree N .R (lines 6-7).…”
Section: Indexing Schemementioning
confidence: 99%