Efficient Consistency Proofs for Generalized Queries on a Committed Database

作者: Rafail Ostrovsky , Charles Rackoff , Adam Smith

DOI: 10.1007/978-3-540-27836-8_87

关键词: DatabaseOnline aggregationRange query (data structures)ViewComputer scienceRange query (database)Range treeMathematical proofTime complexityData structure

摘要: A consistent query protocol (cqp) allows a database owner to publish very short string c which commits her and everybody else particular D, so that any copy of the can later be used answer queries give proofs answers are with commitment c. Here means there is at most one D anybody find (in polynomial time) (Unlike in some previous work, this strong guarantee holds even for owners who try cheat while creating c.) Efficient cqps membership one-dimensional range known [4,11,16]: given pair a,b ∈ ℝ, server all keys lie interval [a,b] proof correct. This paper explores more general types databases. We put forward technique constructing type query, assuming existence data structure/algorithm certain inherent robustness properties we define (called robust algorithm). illustrate our by an efficient orthogonal queries, where points ℝ d asks rectangle [a 1,b 1]×...×[a ,b ]. Our data-robust algorithm within O(log N) factor best standard structure (a tree, due Bentley [2]).

参考文章(26)
Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable Database Queries Springer Netherlands. pp. 43- 54 ,(2002) , 10.1007/978-94-015-9978-8_4
Premkumar Devanbu, Michael Gertz, Charles Martel, Stuart G. Stubblebine, Authentic Third-party Data Publication Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions. pp. 101- 112 ,(2000) , 10.1007/0-306-47008-X_9
Rafail Ostrovsky, Charles Rackoff, Adam Smith, Efficient Consistency Proofs on a Committed Database ,(2003)
Shai Halevi, Silvio Micali, Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing international cryptology conference. pp. 201- 215 ,(1996) , 10.1007/3-540-68697-5_16
Daniele Micciancio, Omer Reingold, Ran Canetti, Perfectly One-Way Probabilistic Hash Functions symposium on the theory of computing. ,(1998)
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Glen Nuckolls, Michael Gertz, Chip Martel, April Kwong, Prem Devanbu, Stuart G. Stubblebine, A General Model for Authentic Data Publication ,(2001)
Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert Cohen, Authenticated Data Structures for Graph and Geometric Searching Topics in Cryptology — CT-RSA 2003. pp. 295- 313 ,(2003) , 10.1007/3-540-36563-X_20
Ralph C. Merkle, A Digital Signature Based on a Conventional Encryption Function international cryptology conference. pp. 369- 378 ,(1987) , 10.1007/3-540-48184-2_32
Petros Maniatis, Mary Baker, Authenticated Append-only Skip Lists arXiv: Cryptography and Security. ,(2003)