Authenticated hierarchical set operations and applications

作者: Ran Canetti , Dimitrios Papadopoulos , Nikolaos Triandopoulos

DOI:

关键词:

摘要: Methods and apparatus are provided for authenticated hierarchical set operations. A third party server processes a query (possibly from client) on data sets outsourced by source of the data. The comprises operation between at least two sets. Authenticated Set Operation techniques flat operations can be iteratively applied In addition, bilinear accumulators extended to provide an extractable accumulation scheme comprising primary accumulator secondary accumulator. client receives (i) encoding answer query, (ii) verification comprising, example, one or more subset witnesses, completeness and/or values, (iii) argument intersection operation, union difference operation.

参考文章(6)
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Optimal verification of operations on dynamic sets international cryptology conference. ,vol. 2010, pp. 91- 110 ,(2011) , 10.1007/978-3-642-22792-9_6
Charalampos Papamanthou, Nikolaos Triandopoulos, Roberto Tamassia, System and method for optimal verification of operations on dynamic sets ,(2011)
Michael T. Goodrich, Charalampos Papamanthou, Duy Nguyen, Roberto Tamassia, Cristina Videira Lopes, Olga Ohrimenko, Nikos Triandopoulos, Efficient verification of web-content searching through authenticated web crawlers Proceedings of the VLDB Endowment. ,vol. 5, pp. 920- 931 ,(2012) , 10.14778/2336664.2336666
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Authenticated hash tables Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. pp. 437- 448 ,(2008) , 10.1145/1455770.1455826
Roberto Tamassia, Charalampos Papamanthou, Nikolaos Triandopoulos, Cryptographic accumulators for authenticated hash tables IACR Cryptology ePrint Archive. ,vol. 2009, pp. 625- ,(2009)
Xiaonan Ma, Windsor Wee Sun Hsu, Hong Chen, System and method for privacy preserving query verification ,(2007)