2010
DOI: 10.1007/978-3-642-17455-1_16
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Authenticated Data Structures with Multilinear Forms

Abstract: Abstract. Cloud computing and cloud storage are becoming increasingly prevalent. In this paradigm, clients outsource their data and computations to third-party service providers. Data integrity in the cloud therefore becomes an important factor for the functionality of these web services. Authenticated data structures, implemented with various cryptographic primitives, have been widely studied as a means of providing efficient solutions to data integrity problems (e.g., Merkle trees). In this paper, we introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(18 citation statements)
references
References 44 publications
0
18
0
Order By: Relevance
“…Another property, which was used by Papamanthou et al [PTT10], is compactness, which means that the size of elements in the groups (as output by the instance generator) is independent of κ. We note that our multilinear maps will not satisfy this requirement, and are therefore unsuitable for the application in [PTT10].…”
Section: Efficient Proceduresmentioning
confidence: 99%
See 1 more Smart Citation
“…Another property, which was used by Papamanthou et al [PTT10], is compactness, which means that the size of elements in the groups (as output by the instance generator) is independent of κ. We note that our multilinear maps will not satisfy this requirement, and are therefore unsuitable for the application in [PTT10].…”
Section: Efficient Proceduresmentioning
confidence: 99%
“…We note that our multilinear maps will not satisfy this requirement, and are therefore unsuitable for the application in [PTT10].…”
Section: Efficient Proceduresmentioning
confidence: 99%
“…Other related works such as verifiable computation [2,5,15,16,17,18,34,40] and authenticated data structures [13,20,21,31,35,36,37,38] are not directly applicable to the streaming setting or their application yields high complexities or interactive protocols.…”
Section: Related Workmentioning
confidence: 99%
“…The secret key always contains one element z i = e(h x 1 , h 2 , ..., h i ) ∈ G i , updating it just consists in computing z i+1 ← e(z i , h i+1 ). Assuming, as Papamanthou et al [PTT10], the existence of multilinear maps where the size of the different groups G i is independent of the number of levels leads to a protocol where the sizes of the parameters and of the secret and public keys are independent of the number of time periods T . However, implementations of such a protocol with the maps from [GGH13] and [CLT13] will not achieve constant size since the size of the elements in the secret key will actually depend on the number of levels and so on the number of time periods.…”
Section: The Frameworkmentioning
confidence: 99%