Advertisement

Authenticated Data Structures

  • Roberto Tamassia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2832)

Abstract

Authenticated data structures are a model of computation where untrusted responders answer queries on a data structure on behalf of a trusted source and provide a proof of the validity of the answer to the user. We present a survey of techniques for designing authenticated data structures and overview their computational efficiency. We also discuss implementation issues and practical applications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379–393. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Buldas, A., Laud, P., Lipmaa, H.: Accountable certificate management using undeniable attestations. In: ACM Conference on Computer and Communications Security, pp. 9–18. ACM Press, New York (2000)Google Scholar
  3. 3.
    Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, S.: Flexible authentication of XML documents. In: Proc. ACM Conference on Computer and Communications Security (2001)Google Scholar
  5. 5.
    Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. In: Fourteenth IFIP 11.3 Conference on Database Security (2000)Google Scholar
  6. 6.
    Gassko, I., Gemmell, P.S., MacKenzie, P.: Efficient and fresh certification. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 342–353. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  7. 7.
    Goodrich, M.T., Lentini, J., Shin, M., Tamassia, R., Cohen, R.: Design and implementation of a distributed authenticated dictionary and its applications. Technical report, Center for Geometric Computing, Brown University (2002), http://www.cs.brown.edu/cgc/stms/papers/stms.pdf
  8. 8.
    Goodrich, M.T., Shin, M., Tamassia, R., Winsborough, W.H.: Authenticated dictionaries for fresh attribute credentials. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 332–347. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Goodrich, M.T., Tamassia, R.: Efficient authenticated dictionaries with skip lists and commutative hashing. Technical report, Johns Hopkins Information Security Institute (2000), http://www.cs.brown.edu/cgc/stms/papers/hashskip.pdf
  10. 10.
    Goodrich, M.T., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 372–388. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticateddictionary with skip lists and commutative hashing. In: Proc. 2001 DARPA Information Survivability Conference and Exposition, vol. 2, pp. 68–82 (2001)Google Scholar
  12. 12.
    Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 295–313. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Kocher, P.C.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 172–177. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Maniatis, P., Baker, M.: Enabling the archival storage of signed documents. In: Proc. USENIX Conf. on File and Storage Technologies (FAST 2002), Monterey, CA, USA (2002)Google Scholar
  15. 15.
    Maniatis, P., Baker, M.: Secure history preservation through timeline entanglement. In: Proc. USENIX Security Symposium (2002)Google Scholar
  16. 16.
    Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.: A general model for authentic data publication (2001), http://www.cs.ucdavis.edu/~devanbu/files/model-paper.pdf
  17. 17.
    Merkle, R.C.: Protocols for public key cryptosystems. In: Proc. Symp. on Security and Privacy, pp. 122–134. IEEE Computer Society Press, Los Alamitos (1980)Google Scholar
  18. 18.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  19. 19.
    Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proc. 7th USENIX Security Symposium, Berkeley, pp. 217–228 (1998)Google Scholar
  20. 20.
    Polivy, D.J., Tamassia, R.: Authenticating distributed data using Web services and XML signatures. In: Proc. ACM Workshop on XML Security (2002)Google Scholar
  21. 21.
    Shin, M., Straub, C., Tamassia, R., Polivy, D.J.: Authenticating Web content with prooflets. Technical report, Center for Geometric Computing, Brown University (2002), http://www.cs.brown.edu/cgc/stms/papers/prooflets.pdf
  22. 22.
    Tamassia, R., Triandopoulos, N.: On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University (2003), http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Roberto Tamassia
    • 1
  1. 1.Department of Computer ScienceBrown UniversityProvidenceUSA

Personalised recommendations