Authenticated Data Structures

作者: Roberto Tamassia

DOI: 10.1007/978-3-540-39658-1_2

关键词:

摘要: Authenticated data structures are a model of computation where untrusted responders answer queries on structure behalf trusted source and provide proof the validity to user. We present survey techniques for designing authenticated overview their computational efficiency. also discuss implementation issues practical applications.

参考文章(20)
Premkumar Devanbu, Michael Gertz, Charles Martel, Stuart G. Stubblebine, Authentic Third-party Data Publication Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions. pp. 101- 112 ,(2000) , 10.1007/0-306-47008-X_9
Paul C. Kocher, On Certificate Revocation and Validation financial cryptography. pp. 172- 177 ,(1998) , 10.1007/BFB0055481
Michael T. Goodrich, Roberto Tamassia, Jasminka Hasić, An Efficient Dynamic and Distributed Cryptographic Accumulator international conference on information security. pp. 372- 388 ,(2002) , 10.1007/3-540-45811-5_29
Petros Maniatis, Mary Baker, Secure History Preservation Through Timeline Entanglement usenix security symposium. pp. 297- 312 ,(2002)
Irene Gassko, Peter S. Gemmell, Philip MacKenzie, Efficient and Fresh Cerification public key cryptography. pp. 342- 353 ,(2000) , 10.1007/978-3-540-46588-1_23
Glen Nuckolls, Michael Gertz, Chip Martel, April Kwong, Prem Devanbu, Stuart G. Stubblebine, A General Model for Authentic Data Publication ,(2001)
Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia, Persistent Authenticated Dictionaries and Their Applications international conference on information security. pp. 379- 393 ,(2001) , 10.1007/3-540-45439-X_26
Ralph C. Merkle, A Certified Digital Signature international cryptology conference. pp. 218- 238 ,(1989) , 10.1007/0-387-34805-0_21
Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert Cohen, Authenticated Data Structures for Graph and Geometric Searching Topics in Cryptology — CT-RSA 2003. pp. 295- 313 ,(2003) , 10.1007/3-540-36563-X_20