Abstract
Bitcoin and Merkle trees are instances of Authenticated data structures (ADS). Unfortunately, such ADS’s are not widely used although they provide enormous security benefits for many distributed systems. This is because current tools and methods are not easy to use for system engineers. We present our ongoing work to create ADS4all, a framework that allows for the design and implementation of ADS’s that are tailored to specific domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alzahrani, N., Spichkova, M., Blech, J.O.: Spatio-temporal models for formal analysis and property-based testing. In: Milazzo, P., Varró, D., Wimmer, M. (eds.) STAF 2016. LNCS, vol. 9946, pp. 196–206. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-50230-4_14
Alzahrani, N., Spichkova, M., Blech, J.O.: From temporal models to property-based testing. arXiv preprint arXiv:1705.10032 (2017)
Baez, J.C., Fong, B.: A compositional framework for passive linear networks. arXiv preprint arXiv:1504.05625 (2015)
Barr, M., Wells, C.: Category Theory for Computing Science, vol. 49. Prentice Hall, New York (1990)
Bove, A., Dybjer, P., Norell, U.: A brief overview of Agda – a functional language with dependent types. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 73–78. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03359-9_6
Bowe, S., Chiesa, A., Green, M., Miers, I., Mishra, P., Wu, H.: ZEXE: enabling decentralized private computation. IACR ePrint 962 (2018)
Elliott, C.: The simple essence of automatic differentiation. In: Proceedings of the ACM on Programming Languages 2(ICFP), 70 (2018)
Fong, B., Spivak, D.I., Tuyéras, R.: Backprop as functor: a compositional perspective on supervised learning. arXiv preprint arXiv:1711.10455 (2017)
Goodrich, M.T., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Demetrescu, C. (ed.) WEA 2007. LNCS, vol. 4525, pp. 94–107. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72845-0_8
Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica 60(3), 505–552 (2011)
Hinze, R., Marsden, D.: Equational reasoning with lollipops, forks, cups, caps, snakes, and speedometers. J. Log. Algebr. Methods Program. 85(5), 931–951 (2016)
Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858. IEEE (2016)
Leroy, X., Doligez, D., Frisch, A., Garrigue, J., Rémy, D., Vouillon, J.: The OCaml system release 4.02. Institut National de Recherche en Informatique et en Automatique 54 (2014)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-48184-2_32
Miller, A., Hicks, M., Katz, J., Shi, E.: Authenticated data structures, generically. ACM SIGPLAN Notices 49(1), 411–423 (2014)
Moggi, E.: Notions of computation and monads. Inf. Comput. 93(1), 55–92 (1991)
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Trans. Storage (TOS) 2(2), 107–138 (2006)
Nakamoto, S., et al.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474. IEEE (2014)
Sørensen, M.H., Urzyczyn, P.: Lectures on the Curry-Howard Isomorphism, vol. 149. Elsevier, Amsterdam (2006)
Thompson, S.: Haskell: The Craft of Functional Programming, vol. 2. Addison-Wesley, Boston (2011)
Wadler, P.: Monads for functional programming. In: Jeuring, J., Meijer, E. (eds.) AFP 1995. LNCS, vol. 925, pp. 24–52. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-59451-5_2
Yallop, J., White, L.: Lightweight higher-kinded polymorphism. In: Codish, M., Sumii, E. (eds.) FLOPS 2014. LNCS, vol. 8475, pp. 119–135. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07151-0_8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alzahrani, N., Khalil, I., Yi, X. (2020). ADS4all: Democratizing Authenticated Data Structures. In: Yangui, S., et al. Service-Oriented Computing – ICSOC 2019 Workshops. ICSOC 2019. Lecture Notes in Computer Science(), vol 12019. Springer, Cham. https://doi.org/10.1007/978-3-030-45989-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-45989-5_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45988-8
Online ISBN: 978-3-030-45989-5
eBook Packages: Computer ScienceComputer Science (R0)