2013
DOI: 10.1007/978-3-642-38348-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Streaming Authenticated Data Structures

Abstract: Abstract. We consider the problem of streaming verifiable computation, where both a verifier and a prover observe a stream of n elements x1, x2, . . . , xn and the verifier can later delegate some computation over the stream to the prover. The prover must return the output of the computation, along with a cryptographic proof to be used for verifying the correctness of the output. Due to the nature of the streaming setting, the verifier can only keep small local state (e.g., logarithmic) which must be updatable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
58
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 68 publications
(58 citation statements)
references
References 43 publications
0
58
0
Order By: Relevance
“…The reason for that is that our homomorphic checksum construction is designed for performance. In comparison, publicly verifiable homomorphic checksums (e.g., lattice-based ones [19] or RSA-based ones [5]) are not as efficient practice.…”
Section: Intuitionmentioning
confidence: 99%
“…The reason for that is that our homomorphic checksum construction is designed for performance. In comparison, publicly verifiable homomorphic checksums (e.g., lattice-based ones [19] or RSA-based ones [5]) are not as efficient practice.…”
Section: Intuitionmentioning
confidence: 99%
“…We note that range query is not to be confused with range proof [8] where the goal is to prove that the committed value lies in a specified integer range without revealing it. Authenticated data structures (ADS) [14,21,35,36,38,42] are often set in the three party model with a trusted owner, a trusted client and a malicious server; the owner outsources the data to the server and later the client interacts with the server to run queries on the data. The security requirement of such constructions is data authenticity for the client against the server.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in [52], these bounds are optimal for hash-based methods. Variations of this approach and extensions to other types of queries have also been investigated (e.g., [9,13,21,25,28,42,53]). Solutions for authenticated membership queries using one-way accumulators were introduced by Benaloh and de Mare [5].…”
Section: Related Workmentioning
confidence: 99%
“…Developing secure protocols for hash tables that authenticate (non-)membership queries in constant time has been a long-standing open problem [36]. Using collisionresistant hashing and Merkle's tree construction [33] to produce the set digest, (non-)membership queries in sets can be authenticated with logarithmic costs (e.g., [6,23,36,42,43,53]). One can achieve complexities better than logarithmic by using alternative cryptographic primitives.…”
Section: Introductionmentioning
confidence: 99%