A New Dynamic Accumulator for Batch Updates

作者: Peishun Wang , Huaxiong Wang , Josef Pieprzyk

DOI: 10.1007/978-3-540-77048-0_8

关键词:

摘要: A dynamic accumulator is an algorithm, which gathers together a large set of elements into constant-size value such that for given element accumulated, there witness confirming the was indeed included value, with property accumulated can be dynamically added and deleted into/from original cost addition or deletion operation independent number elements. Although first presented ten years ago, still no standard formal definition accumulators. In this paper, we generalize definitions accumulators, formulate security game accumulators so-called Chosen Element Attack (CEA), propose new batch updates based on Paillier cryptosystem. Our construction makes update operations at unit cost. We prove its under extended strong RSA (es-RSA) assumption.

参考文章(26)
Michael T. Goodrich, Roberto Tamassia, Jasminka Hasić, An Efficient Dynamic and Distributed Cryptographic Accumulator international conference on information security. pp. 372- 388 ,(2002) , 10.1007/3-540-45811-5_29
Lan Nguyen, Accumulators from Bilinear Pairings and Applications Lecture Notes in Computer Science. pp. 275- 292 ,(2005) , 10.1007/978-3-540-30574-3_19
Kaisa Nyberg, Fast Accumulated Hashing fast software encryption. pp. 83- 87 ,(1996) , 10.1007/3-540-60865-6_45
Tomas Sander, Efficient Accumulators without Trapdoor Extended Abstracts international conference on information and communication security. pp. 252- 262 ,(1999) , 10.1007/978-3-540-47942-0_21
Craig Gentry, Zulfikar Ramzan, RSA Accumulator Based Broadcast Encryption international conference on information security. pp. 73- 86 ,(2004) , 10.1007/978-3-540-30144-8_7
Niko Barić, Birgit Pfitzmann, Collision-free accumulators and fail-stop signature schemes without trees theory and application of cryptographic techniques. pp. 480- 494 ,(1997) , 10.1007/3-540-69053-0_33
Josh Benaloh, Michael de Mare, One-way accumulators: a decentralized alternative to digital signatures theory and application of cryptographic techniques. pp. 274- 285 ,(1994) , 10.1007/3-540-48285-7_24
S. Pohlig, M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) IEEE Transactions on Information Theory. ,vol. 24, pp. 106- 110 ,(1978) , 10.1109/TIT.1978.1055817
Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen, Paillier's cryptosystem revisited Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01. pp. 206- 214 ,(2001) , 10.1145/501983.502012
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup, Anonymous Identification in Ad Hoc Groups theory and application of cryptographic techniques. pp. 609- 626 ,(2004) , 10.1007/978-3-540-24676-3_36