2008
DOI: 10.14778/1453856.1453876
|View full text |Cite
|
Sign up to set email alerts
|

Structural signatures for tree data structures

Abstract: Data sharing with multiple parties over a third-party distribution framework requires that both data integrity and confidentiality be assured. One of the most widely used data organization structures is the tree structure. When such structures encode sensitive information (such as in XML documents), it is crucial that integrity and confidentiality be assured not only for the content, but also for the structure. Digital signature schemes are commonly used to authenticate the integrity of the data. The most wide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(42 citation statements)
references
References 29 publications
0
41
0
1
Order By: Relevance
“…This threat model has received considerable attention because of applications to DNS security (see [20,25,26,32] for more details). We emphasize that in this model, zero-knowledge is a property of the proofs (as in the context of zero-knowledge sets, lists [12,19] and primary secondary resolver systems [32]) and not of the protocol.…”
Section: Our Contributionsmentioning
confidence: 99%
“…This threat model has received considerable attention because of applications to DNS security (see [20,25,26,32] for more details). We emphasize that in this model, zero-knowledge is a property of the proofs (as in the context of zero-knowledge sets, lists [12,19] and primary secondary resolver systems [32]) and not of the protocol.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Redactable signatures allow a third party to modify signed data by removing blocks, as introduced by Steinfeld et al in [30] and by Johnson et al in [19]. Other redactable signature schemes emerged since then, e.g., [9,24,1,22]. Second, Kiltz et al introduced append-only signatures [20].…”
Section: Definition 2 (Contingency:) Contingency Describes the Verifmentioning
confidence: 99%
“…However, not even all schemes are private, e.g. for the scheme by Kundu and Bertino [22] attacks on transparency and privacy [7] and one attacking structural integrity [29] have been given.…”
Section: Definition 2 (Contingency:) Contingency Describes the Verifmentioning
confidence: 99%
“…Wong et al [28] enable mining of association rules on data encrypted with 1-to-n item mapping transformations. Kundu and Bertino [14] devise a technique that provides both integrity and privacy of records organized as trees (e.g., XML data). Our schemes focus only on the integrity of data.…”
Section: Related Workmentioning
confidence: 99%
“…All entries between [ and ] in newVO that correspond to this subtree are inserted into VO. Finally (lines [12][13][14][15][16], if E n is Hit, the matching value or subtree of cachedVO is appended to VO. With the new VO, the client re-computes H D P M and verifies it against the new signature.…”
Section: Query Monitoringmentioning
confidence: 99%