摘要: Authenticated data structures are a model of computation where untrusted responders answer queries on structure behalf trusted source and provide proof the validity to user. We present survey techniques for designing authenticated overview their computational efficiency. also discuss implementation issues practical applications.